A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-2323-1 | linux-4.19 new package |
![]() |
EUVD-2020-3181 | A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality. |
![]() |
USN-4427-1 | Linux kernel vulnerabilities |
![]() |
USN-4439-1 | Linux kernel vulnerabilities |
![]() |
USN-4440-1 | linux kernel vulnerabilities |
![]() |
USN-4483-1 | Linux kernel vulnerabilities |
![]() |
USN-4485-1 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T11:14:15.011Z
Reserved: 2020-03-20T00:00:00
Link: CVE-2020-10766

No data.

Status : Modified
Published: 2020-09-15T23:15:12.143
Modified: 2024-11-21T04:56:01.543
Link: CVE-2020-10766


No data.