CVE-2020-10768

NameCVE-2020-10768
DescriptionA flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2323-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux (PTS)bullseye5.10.223-1fixed
bullseye (security)5.10.226-1fixed
bookworm6.1.115-1fixed
bookworm (security)6.1.119-1fixed
trixie6.12.5-1fixed
sid6.12.6-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linuxsourcestretch4.9.228-1
linuxsourcebuster4.19.131-1
linuxsource(unstable)5.7.6-1
linux-4.19sourcestretch4.19.132-1~deb9u2DLA-2323-1

Notes

https://www.openwall.com/lists/oss-security/2020/06/10/1
https://git.kernel.org/linus/4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf

Search for package or bug name: Reporting problems