[SRU][B/J/K][PATCH 0/1] CVE-2023-0045
Yuxuan Luo
yuxuan.luo at canonical.com
Thu Feb 9 17:54:33 UTC 2023
[Impact]
It is discovered that the Linux kernel fails to correctly mitigate the
Spectre-BTI attacks, leaving the process exposed for a short period of time
after the syscall, which renders the victim vulnerable to values already
injected on the BTB, prior to the prctl syscall.
[Backport]
It is a clean cherry-pick for all three affected kernels.
[Test]
Compile, boot, and run the PoC given by the discoverer:
https://github.com/es0j/CVE-2023-0045
[Potential Regression]
The risk of the potential regression should be fairly low and limited to the
specific file.
Rodrigo Branco (1):
x86/bugs: Flush IBP in ib_prctl_set()
arch/x86/kernel/cpu/bugs.c | 2 ++
1 file changed, 2 insertions(+)
--
2.34.1
More information about the kernel-team
mailing list