lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <ba47d363-28e8-b470-7752-b684e3d05250@jsigle.com>
Date: Sun, 24 Mar 2024 06:23:13 +0100
From: "Joerg M. Sigle" <joerg.sigle@...gle.com>
To: Jonathan Corbet <corbet@....net>
Cc: linux-doc@...r.kernel.org, linux-kernel@...r.kernel.org,
 Dave Hansen <dave.hansen@...ux.intel.com>,
 Daniel Sneddon <daniel.sneddon@...ux.intel.com>
Subject: Patch [001/001] Documentation: Correct small errors in recently added
 info on CPU vulnerabilities

From: Joerg-Michael Sigle <joerg.sigle@...gle.com>

In file     Documentation/admin-guide/hw-vuln/gather_data_sampling.rst
the words   Guest can infer guest from other guests
should be   Guests can infer data from other guests

Found in 15.5.152, this may affect all kernel versions with the same documentation file.
The error came as part of commit 8974eb588283b7d44a7c91fa09fcbaf380339f3a in the master branch.

Signed-off-by: Joerg-Michael Sigle <joerg.sigle@...gle.com>

---

The corrected text is in section "Attack scenarios", example 4; also visible in the 2nd diff output in:
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=8974eb588283b7d44a7c91fa09fcbaf380339f3a

I'm submitting this patch to you as you're referenced in that patch
or shown by scripts/get_maintainer.pl -f Documentation/admin-guide/hw-vuln/
Hope this is ok and useful. Thanks & kind regards, Joerg


# diff -ru a/Documentation/admin-guide/hw-vuln/gather_data_sampling.rst b/Documentation/admin-guide/hw-vuln/gather_data_sampling.rst
--- a/Documentation/admin-guide/hw-vuln/gather_data_sampling.rst        2024-03-15 19:30:36.000000000 +0100
+++ b/Documentation/admin-guide/hw-vuln/gather_data_sampling.rst        2024-03-24 06:07:51.847427462 +0100
@@ -32,7 +32,7 @@
        Non-enclaves can infer SGX enclave data
        Userspace can infer kernel data
        Guests can infer data from hosts
-       Guest can infer guest from other guests
+       Guests can infer data from other guests
        Users can infer data from other users

 Because of this, it is important to ensure that the mitigation stays enabled in

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ