Red Hat Bugzilla – Bug 1620555
CVE-2018-15594 kernel: Mishandling of indirect calls weakens Spectre mitigation for paravirtual guests
Last modified: 2018-09-07 05:45:29 EDT
It was found that arch/x86/kernel/paravirt.c in the Linux kernel before 4.18.1 It was found that paravirt_patch_call/jump() functions in the arch/x86/kernel/paravirt.c in the Linux kernel mishandle certain indirect calls, which makes it easier for attackers to conduct Spectre-v2 attacks against paravirtualized guests. An upstream patch: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5800dc5c19f34e6e03b5adab1282535cb102fafd
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1620557]
This was fixed for Fedora users with the 4.17.14-202 kernel update.