rpm package
suse/kgraft-patch-SLE12-SP3_Update_33&distro=HPE Helion OpenStack 8
pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_33&distro=HPE%20Helion%20OpenStack%208
Vulnerabilities (3)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2020-10768 | — | < 1-4.3.1 | 1-4.3.1 | Sep 15, 2020 | A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks | ||
| CVE-2020-10767 | — | < 1-4.3.1 | 1-4.3.1 | Sep 15, 2020 | A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. T | ||
| CVE-2020-10766 | — | < 1-4.3.1 | 1-4.3.1 | Sep 15, 2020 | A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This iss |
- CVE-2020-10768Sep 15, 2020affected < 1-4.3.1fixed 1-4.3.1
A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks
- CVE-2020-10767Sep 15, 2020affected < 1-4.3.1fixed 1-4.3.1
A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. T
- CVE-2020-10766Sep 15, 2020affected < 1-4.3.1fixed 1-4.3.1
A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This iss