A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-10766.json"
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@dbbe2ad02e9df26e372f38cc3e70dab9222c832e",
"id": "CVE-2020-10766-239b8e95",
"target": {
"file": "arch/x86/kernel/process.c",
"function": "__speculation_ctrl_update"
},
"deprecated": false,
"digest": {
"function_hash": "250710125756048984842722933078406547396",
"length": 669.0
},
"signature_type": "Function",
"signature_version": "v1"
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@dbbe2ad02e9df26e372f38cc3e70dab9222c832e",
"id": "CVE-2020-10766-fe1e5fa2",
"target": {
"file": "arch/x86/kernel/process.c"
},
"deprecated": false,
"digest": {
"line_hashes": [
"223598936207650923025435889555090071458",
"51941984143126213303642955956130225496",
"332010218412004142622122792097786390298",
"196807880300784702122698364023331092448",
"219204688460491980966169296265965354595",
"187556765688784133821185655933544331868",
"174182776923154971239561183807260016612",
"268988646742004861009343260164382758727",
"272004541045723271693685430100529553213",
"316936303680016290319045399938297543663",
"14053540321143755774389207234345173957",
"89672397712851798756268444260495039722",
"198143662356294845207255966043940845345",
"184513831414642033403474974711809925854"
],
"threshold": 0.9
},
"signature_type": "Line",
"signature_version": "v1"
}
]