We found results for “”
CVE-2020-10766
Good to know:
Date: September 15, 2020
A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.
Language: C
Severity Score
Related Resources (7)
Severity Score
Weakness Type (CWE)
Insufficient Information
NVD-CWE-noinfoExpected Behavior Violation
CWE-440Top Fix
Upgrade Version
Upgrade to version v5.8-rc1,v4.4.228,v4.9.228,v4.14.185,v4.19.129,v5.4.47,v5.7.3
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | LOCAL |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | NONE |
Availability (A): | NONE |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | LOCAL |
Access Complexity (AC): | LOW |
Authentication (AU): | NONE |
Confidentiality (C): | PARTIAL |
Integrity (I): | NONE |
Availability (A): | NONE |
Additional information: |