Commit | Line | Data |
---|---|---|
1aaa6ba3 NR |
1 | 0[$] Strengthening user-space Spectre v2 protection null/LWN/0000764209 70\r |
2 | i [Kernel] Sep 5, 2018 21:47 UTC (Wed) (corbet)\r | |
3 | i\r | |
4 | i The Spectre variant 2 vulnerability allows the speculative\r | |
5 | i execution of incorrect (in an attacker-controllable way)\r | |
6 | i indirect branch predictions, resulting in the ability to\r | |
7 | i exfiltrate information via side channels. The kernel has been\r | |
8 | i reasonably well protected against this variant since shortly\r | |
9 | i after its disclosure in January. It is, however, possible for\r | |
10 | i user-space processes to use Spectre v2 to attack each other;\r | |
11 | i thus far, the mainline kernel has offered relatively little\r | |
e818d449 NR |
12 | i protection against such attacks. A recent [1]proposal from\r |
13 | i Jiri Kosina may change that situation, but there are still\r | |
14 | i some disagreements around the details.\r | |
15 | i \r | |
16 | i \r | |
17 | i \r | |
18 | i [1] https://lwn.net/ml/linux-kernel/nycvar.YFH.7.76.1809041619-\r | |
19 | i 510.15880@cbobk.fhfr.pm/\r | |
1aaa6ba3 | 20 | i\r |