[SRU Focal 0/3] CVE-2022-27672

Thadeu Lima de Souza Cascardo cascardo at canonical.com
Wed Jun 21 20:22:40 UTC 2023


[Impact]
A VM may force the CPU to go to idle and when it gets back from idle, it
could leverage the RSB from a sibling thread to mount a speculative
execution attack.

[Backport]
Simple conflicts and the placement of setting mitigate_smt_rsb.

[Potential regression]
It would affect VMs, specially when dealing with idleness.

Tom Lendacky (3):
  x86/speculation: Identify processors vulnerable to SMT RSB predictions
  KVM: x86: Mitigate the cross-thread return address predictions bug
  Documentation/hw-vuln: Add documentation for Cross-Thread Return
    Predictions

 .../admin-guide/hw-vuln/cross-thread-rsb.rst  | 92 +++++++++++++++++++
 Documentation/admin-guide/hw-vuln/index.rst   |  1 +
 arch/x86/include/asm/cpufeatures.h            |  1 +
 arch/x86/kernel/cpu/common.c                  |  9 +-
 arch/x86/kvm/x86.c                            | 44 ++++++---
 5 files changed, 134 insertions(+), 13 deletions(-)
 create mode 100644 Documentation/admin-guide/hw-vuln/cross-thread-rsb.rst

-- 
2.34.1




More information about the kernel-team mailing list