APPLIED: [SRU Focal 0/3] CVE-2022-27672

Luke Nowakowski-Krijger luke.nowakowskikrijger at canonical.com
Thu Jul 6 19:10:29 UTC 2023


Applied to focal:linux master-next,

Thanks!

- Luke

On Wed, Jun 21, 2023 at 1:24 PM Thadeu Lima de Souza Cascardo <
cascardo at canonical.com> wrote:

> [Impact]
> A VM may force the CPU to go to idle and when it gets back from idle, it
> could leverage the RSB from a sibling thread to mount a speculative
> execution attack.
>
> [Backport]
> Simple conflicts and the placement of setting mitigate_smt_rsb.
>
> [Potential regression]
> It would affect VMs, specially when dealing with idleness.
>
> Tom Lendacky (3):
>   x86/speculation: Identify processors vulnerable to SMT RSB predictions
>   KVM: x86: Mitigate the cross-thread return address predictions bug
>   Documentation/hw-vuln: Add documentation for Cross-Thread Return
>     Predictions
>
>  .../admin-guide/hw-vuln/cross-thread-rsb.rst  | 92 +++++++++++++++++++
>  Documentation/admin-guide/hw-vuln/index.rst   |  1 +
>  arch/x86/include/asm/cpufeatures.h            |  1 +
>  arch/x86/kernel/cpu/common.c                  |  9 +-
>  arch/x86/kvm/x86.c                            | 44 ++++++---
>  5 files changed, 134 insertions(+), 13 deletions(-)
>  create mode 100644 Documentation/admin-guide/hw-vuln/cross-thread-rsb.rst
>
> --
> 2.34.1
>
>
> --
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20230706/252b9c8b/attachment.html>


More information about the kernel-team mailing list