Commit | Line | Data |
---|---|---|
1aaa6ba3 NR |
1 | 0[$] Strengthening user-space Spectre v2 protection null/LWN/0000764209 70\r |
2 | i [Kernel] Sep 5, 2018 21:47 UTC (Wed) (corbet)\r | |
3 | i\r | |
4 | i The Spectre variant 2 vulnerability allows the speculative\r | |
5 | i execution of incorrect (in an attacker-controllable way)\r | |
6 | i indirect branch predictions, resulting in the ability to\r | |
7 | i exfiltrate information via side channels. The kernel has been\r | |
8 | i reasonably well protected against this variant since shortly\r | |
9 | i after its disclosure in January. It is, however, possible for\r | |
10 | i user-space processes to use Spectre v2 to attack each other;\r | |
11 | i thus far, the mainline kernel has offered relatively little\r | |
12 | i protection against such attacks. A recent proposal from Jiri\r | |
13 | i Kosina may change that situation, but there are still some\r | |
14 | i disagreements around the details.\r | |
15 | i\r |