X-Git-Url: http://git.nikiroo.be/?p=gofetch.git;a=blobdiff_plain;f=test%2Fexpected%2FLWN%2F0000764209.header.html;fp=test%2Fexpected%2FLWN%2F0000764209.header.html;h=e0e86dfce12747b38542473e2c3951f9cf90e997;hp=0e94410c54f7e61701ab1cec9fa8ff71aa81c2c7;hb=3367f6256b5143b7cba2a61de36e74f389a5f379;hpb=b389651b0012a7ba1ff30d164958e155688ac216 diff --git a/test/expected/LWN/0000764209.header.html b/test/expected/LWN/0000764209.header.html index 0e94410..e0e86df 100644 --- a/test/expected/LWN/0000764209.header.html +++ b/test/expected/LWN/0000764209.header.html @@ -9,11 +9,11 @@
-

[$] Strengthening user-space Spectre v2 protection

+

[$] Strengthening user-space Spectre v2 protection

([Kernel] Sep 5, 2018 21:47 UTC (Wed) (corbet))

- The Spectre variant 2 vulnerability allows the speculative execution of incorrect (in an attacker-controllable way) indirect branch predictions, resulting in the ability to exfiltrate information via side channels. The kernel has been reasonably well protected against this variant since shortly after its disclosure in January. It is, however, possible for user-space processes to use Spectre v2 to attack each other; thus far, the mainline kernel has offered relatively little protection against such attacks. A recent proposal from Jiri Kosina may change that situation, but there are still some disagreements around the details. + The Spectre variant 2 vulnerability allows the speculative execution of incorrect (in an attacker-controllable way) indirect branch predictions, resulting in the ability to exfiltrate information via side channels. The kernel has been reasonably well protected against this variant since shortly after its disclosure in January. It is, however, possible for user-space processes to use Spectre v2 to attack each other; thus far, the mainline kernel has offered relatively little protection against such attacks. A recent [1]proposal from Jiri Kosina may change that situation, but there are still some disagreements around the details.



[1] https://lwn.net/ml/linux-kernel/nycvar.YFH.7.76.1809041619510.15880@cbobk.fhfr.pm/