Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 10 Jun 2020 21:21:03 +1000
From: Wade Mealing <>
Subject: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768

A number of flaws were discussed in the registers article this morning
( )
which have been submitted for inclusion upstream already.

Listed below are the CVE's that Red Hat has assigned.  As far as I can
tell there are no existing  CVE assignments for these flaws. I have
not done adequate investigation to correctly identify affected
versions of the kernel, however this is a flaw in the fix for
CVE-2018-3639, affected systems would likely be affected by the flaws
listed below if they required the fix.

- Rogue cross-process SSBD shutdown. Linux scheduler logical bug
allows an attacker to turn off the SSBD protection.

- Indirect Branch Prediction Barrier is force-disabled when STIBP is
unavailable or enhanced IBRS is available.

-  Indirect branch speculation can be enabled after it was
force-disabled by the PR_SPEC_FORCE_DISABLE prctl command.

The Red Hat Bugzillas for these flaws are

These  bugzillas are a work in progress and will be updated as I get
more time to correctly input adequate information.

Thank you.

Wade Mealing

Product Security - Kernel

Red Hat


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.