Skip to content

system calls are vulnerable to Spectre V1 attacks on CPUs with speculative execution #14125

@andrewboie

Description

@andrewboie

Describe the bug
This paper is a good summary:
https://arxiv.org/pdf/1902.05178.pdf

We have, either in-tree or in code review, mitigations for Meltdown, Foreshadow, Spectre V2, Spectre V4. Although recent research has a poor prognosis on ever mitigating all of these attacks on affected CPUs, we would like to at least ensure that bounds-check-bypass style attacks (Spectre V1) cannot be performed with system call arguments which index some array.

Metadata

Metadata

Assignees

Labels

Type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions