We found results for “”
CVE-2020-10768
Good to know:
Date: September 15, 2020
A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.
Language: C
Severity Score
Related Resources (7)
Severity Score
Weakness Type (CWE)
Insufficient Information
NVD-CWE-noinfoExpected Behavior Violation
CWE-440Top Fix
Upgrade Version
Upgrade to version v5.8-rc1,v5.7.3,v5.4.47,v4.19.129,v4.14.185,v4.9.228,v4.4.228
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | LOCAL |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | NONE |
Availability (A): | NONE |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | LOCAL |
Access Complexity (AC): | LOW |
Authentication (AU): | NONE |
Confidentiality (C): | PARTIAL |
Integrity (I): | NONE |
Availability (A): | NONE |
Additional information: |