Description
A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2323-1 | linux-4.19 new package |
EUVD |
EUVD-2020-3181 | A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality. |
Ubuntu USN |
USN-4427-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4439-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4440-1 | linux kernel vulnerabilities |
Ubuntu USN |
USN-4483-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4485-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T11:14:15.011Z
Reserved: 2020-03-20T00:00:00.000Z
Link: CVE-2020-10766
No data.
Status : Modified
Published: 2020-09-15T23:15:12.143
Modified: 2024-11-21T04:56:01.543
Link: CVE-2020-10766
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN