APPLIED [OEM-5.14/OEM-5.17/OEM-6.0] Re: [SRU][B/J/K/OEM-5.14/OEM-5.17/OEM-6.0][PATCH v2 0/1] CVE-2023-0045
Timo Aaltonen
tjaalton at ubuntu.com
Fri Feb 10 09:30:46 UTC 2023
Yuxuan Luo kirjoitti 9.2.2023 klo 22.10:
> [Impact]
> It is discovered that the Linux kernel fails to correctly mitigate the
> Spectre-BTI attacks, leaving the process exposed for a short period of time
> after the syscall, which renders the victim vulnerable to values already
> injected on the BTB, prior to the prctl syscall.
>
> [Backport]
> It is a clean cherry-pick for all three affected kernels.
>
> [Test]
> Compile, boot, and run the PoC given by the discoverer:
> https://github.com/es0j/CVE-2023-0045
>
> [Potential Regression]
> The risk of the potential regression should be fairly low and limited to the
> specific file.
>
> Rodrigo Branco (1):
> x86/bugs: Flush IBP in ib_prctl_set()
>
> arch/x86/kernel/cpu/bugs.c | 2 ++
> 1 file changed, 2 insertions(+)
>
applied to oem kernels, thanks
--
t
More information about the kernel-team
mailing list