Three flaws were found in the kernels implementation of SSBD. A logic flaw that sets the wrong value for enforcing SSBD. "It is exploitable if the attacker creates a process which enforces SSBD and has the contrary value of STIBP (Single Threaded Indirect Branch Predictors) than the victim process … and schedules it on the same core as the victim process," he explained.
You must be logged in to post a comment.