4 <meta http-equiv='content-type' content='text/html; charset=utf-
8'
>
5 <meta name='viewport' content='width=device-width, initial-scale=
1.0'
>
6 <style type='text/css'
>
7 body { margin:
1em
15%; }
11 <div class='story-header'
>
12 <h2><a href='
0000764209.html'
>[$] Strengthening user-space Spectre v2 protection
</a></h2>
13 <div class='details'
>([Kernel] Sep
5,
2018 21:
47 UTC (Wed) (corbet))
</div>
15 <div class='content' style='text-align: justify'
>
16 The Spectre variant
2 vulnerability allows the speculative execution of incorrect (in an attacker-controllable way) indirect branch predictions, resulting in the ability to exfiltrate information via side channels. The kernel has been reasonably well protected against this variant since shortly after its disclosure in January. It is, however, possible for user-space processes to use Spectre v2 to attack each other; thus far, the mainline kernel has offered relatively little protection against such attacks. A recent [
1]proposal from Jiri Kosina may change that situation, but there are still some disagreements around the details.
<br/><br/><br/><br/>[
1] https://lwn.net/ml/linux-kernel/nycvar.YFH
.7.76.1809041619510.15880@cbobk.fhfr.pm/