| 1 | 0[$] Strengthening user-space Spectre v2 protection null/LWN/0000764209 70\r |
| 2 | i [Kernel] Sep 5, 2018 21:47 UTC (Wed) (corbet)\r |
| 3 | i\r |
| 4 | i The Spectre variant 2 vulnerability allows the speculative\r |
| 5 | i execution of incorrect (in an attacker-controllable way)\r |
| 6 | i indirect branch predictions, resulting in the ability to\r |
| 7 | i exfiltrate information via side channels. The kernel has been\r |
| 8 | i reasonably well protected against this variant since shortly\r |
| 9 | i after its disclosure in January. It is, however, possible for\r |
| 10 | i user-space processes to use Spectre v2 to attack each other;\r |
| 11 | i thus far, the mainline kernel has offered relatively little\r |
| 12 | i protection against such attacks. A recent [1]proposal from\r |
| 13 | i Jiri Kosina may change that situation, but there are still\r |
| 14 | i some disagreements around the details.\r |
| 15 | i \r |
| 16 | i \r |
| 17 | i \r |
| 18 | i [1] https://lwn.net/ml/linux-kernel/nycvar.YFH.7.76.1809041619-\r |
| 19 | i 510.15880@cbobk.fhfr.pm/\r |
| 20 | i\r |