<div dir="ltr"><div>Acked-by: Luke Nowakowski-Krijger <<a href="mailto:luke.nowakowskikrijger@canonical.com">luke.nowakowskikrijger@canonical.com</a>><br></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Thu, Feb 9, 2023 at 12:11 PM Yuxuan Luo <<a href="mailto:yuxuan.luo@canonical.com">yuxuan.luo@canonical.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">[Impact]<br>
It is discovered that the Linux kernel fails to correctly mitigate the<br>
Spectre-BTI attacks, leaving the process exposed for a short period of time<br>
after the syscall, which renders the victim vulnerable to values already<br>
injected on the BTB, prior to the prctl syscall.<br>
<br>
[Backport]<br>
It is a clean cherry-pick for all three affected kernels.<br>
<br>
[Test]<br>
Compile, boot, and run the PoC given by the discoverer:<br>
<a href="https://github.com/es0j/CVE-2023-0045" rel="noreferrer" target="_blank">https://github.com/es0j/CVE-2023-0045</a><br>
<br>
[Potential Regression]<br>
The risk of the potential regression should be fairly low and limited to the<br>
specific file.<br>
<br>
Rodrigo Branco (1):<br>
x86/bugs: Flush IBP in ib_prctl_set()<br>
<br>
arch/x86/kernel/cpu/bugs.c | 2 ++<br>
1 file changed, 2 insertions(+)<br>
<br>
-- <br>
2.34.1<br>
<br>
<br>
-- <br>
kernel-team mailing list<br>
<a href="mailto:kernel-team@lists.ubuntu.com" target="_blank">kernel-team@lists.ubuntu.com</a><br>
<a href="https://lists.ubuntu.com/mailman/listinfo/kernel-team" rel="noreferrer" target="_blank">https://lists.ubuntu.com/mailman/listinfo/kernel-team</a><br>
</blockquote></div></div>