The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp [..] The kernel failed to protect applications that attempted to protect against Spectre v2 leaving them open to attack from other processes running on the same physical core in another hyperthread. Reference: https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crx Upstream fix: https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2187260]
This was fixed for Fedora with the 6.1.16 stable kernel updates.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:4378 https://access.redhat.com/errata/RHSA-2023:4378
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:4377 https://access.redhat.com/errata/RHSA-2023:4377
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-1998