A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10767 | Issue Tracking Third Party Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=21998a351512eba4ed5969006f0c55882d995ada | Patch Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10767 | Issue Tracking Third Party Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=21998a351512eba4ed5969006f0c55882d995ada | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 04:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10767 - Issue Tracking, Third Party Advisory | |
References | () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=21998a351512eba4ed5969006f0c55882d995ada - Patch, Vendor Advisory |
Information
Published : 2020-09-15 23:15
Updated : 2024-11-21 04:56
NVD link : CVE-2020-10767
Mitre link : CVE-2020-10767
CVE.ORG link : CVE-2020-10767
JSON object : View
Products Affected
linux
- linux_kernel
CWE