From mboxrd@z Thu Jan 1 00:00:00 1970 From: =?ISO-8859-1?Q?R=E9mi?= Denis-Courmont Subject: Re: [PATCH] phonet: af_phonet: Fix Spectre v1 vulnerability Date: Sat, 22 Dec 2018 11:35:18 +0200 Message-ID: <2534569.ObK2OKVxXI@philogene> References: <20181221214117.GA1539@embeddedor> Mime-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 8BIT Cc: Remi Denis-Courmont , "David S. Miller" , netdev@vger.kernel.org, linux-kernel@vger.kernel.org To: "Gustavo A. R. Silva" Return-path: Received: from poy.remlab.net ([94.23.215.26]:35954 "EHLO ns207790.ip-94-23-215.eu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732563AbeLVTCJ (ORCPT ); Sat, 22 Dec 2018 14:02:09 -0500 In-Reply-To: <20181221214117.GA1539@embeddedor> Sender: netdev-owner@vger.kernel.org List-ID: Le vendredi 21 décembre 2018, 23:41:17 EET Gustavo A. R. Silva a écrit : > protocol is indirectly controlled by user-space, hence leading to > a potential exploitation of the Spectre variant 1 vulnerability. No objections but AFAIR, only privileged userspace can trigger that code so the impact is kinda limited. -- Rémi Denis-Courmont