Описание
Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
linux | fixed | 5.18.16-1 | package |
Примечания
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00706.html
https://git.kernel.org/linus/2b1299322016731d56807aa49254a5ea3080b6b3
https://git.kernel.org/linus/ba6e31af2be96c4d0536f2152ed6f7b6c11bca47
EPSS
Связанные уязвимости
Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
Уязвимость функции spectre_v2_select_mitigation() ядра операционной системы Linux, позволяющая нарушителю получить выполнить произвольный код
EPSS