A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-04T11:14:15.011Z

Reserved: 2020-03-20T00:00:00

Link: CVE-2020-10766

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-09-15T23:15:12.143

Modified: 2024-11-21T04:56:01.543

Link: CVE-2020-10766

cve-icon Redhat

Severity : Important

Publid Date: 2020-06-09T17:00:00Z

Links: CVE-2020-10766 - Bugzilla

cve-icon OpenCVE Enrichment

No data.