| 1 | 0[$] Strengthening user-space Spectre v2 protection null/LWN/0000764209 70\r |
| 2 | i [Kernel] Sep 5, 2018 21:47 UTC (Wed) (corbet)\r |
| 3 | i\r |
| 4 | i The Spectre variant 2 vulnerability allows the speculative\r |
| 5 | i execution of incorrect (in an attacker-controllable way)\r |
| 6 | i indirect branch predictions, resulting in the ability to\r |
| 7 | i exfiltrate information via side channels. The kernel has been\r |
| 8 | i reasonably well protected against this variant since shortly\r |
| 9 | i after its disclosure in January. It is, however, possible for\r |
| 10 | i user-space processes to use Spectre v2 to attack each other;\r |
| 11 | i thus far, the mainline kernel has offered relatively little\r |
| 12 | i protection against such attacks. A recent proposal from Jiri\r |
| 13 | i Kosina may change that situation, but there are still some\r |
| 14 | i disagreements around the details.\r |
| 15 | i\r |