We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: ipv4: prevent potential spectre v1 gadget in fib_metrics_match() if (!type) continue; if (type > RTAX_MAX) return false; ... fi_val = fi->fib_metrics->metrics[type - 1]; @type being used as an array index, we need to prevent cpu speculation or risk leaking kernel memory content.
Reserved 2025-03-27 | Published 2025-03-27 | Updated 2025-05-04 | Assigner Linuxgit.kernel.org/...c/8f0eb24f1a7a60ce635f0d757a46f1a37a4d467d
git.kernel.org/...c/7f9828fb1f688210e681268490576f0ca65c322a
git.kernel.org/...c/ca3cf947760de050d558293002ad3e7f4b8745d2
git.kernel.org/...c/f9753ebd61be2d957b5504cbd3fd719674f05b7a
git.kernel.org/...c/5e9398a26a92fc402d82ce1f97cc67d832527da0
Support options