Description: A flaw that boot CPU could be vulnerable for the speculative execution behavior kind of attacks in the Linux kernel X86 CPU Power management options functionality was found in the way user resuming CPU from suspend-to-RAM. A local user could use this flaw to potentially get unauthorized access to some memory of the CPU similar to the speculative execution behavior kind of attacks. Broken commit info: https://git.kernel.org/linus/772439717dbf703b39990be58d8d4e3e4ad0598a https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=772439717dbf703b39990be58d8d4e3e4ad0598a Bugfix commit info: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=edc7b755e8fce10009ac85bb234a035557301bc4 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=9ffaef8717992fd23184a745ca8224d9635f9db3 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=aeb473e7ed48b1d5e511353cbef5f4e6e00544ac https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=1d2e6ac145b6b818542a0810df51c931a696ab0d https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=7b5f17024f115b6aa42d2a079326dd0ca8e3449b https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e2a1256b17b16f9b9adf1b6fea56819e7b68e463 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=fab4b79e869a8e1c0f7d931a4eff0285d9b5efa7 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=fc4bdaed4d4ea4209e65115bd3948a1e4ac51cbb https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=17f3e31c860371ff72db7f9b2fb44ab008a133e0 https://git.kernel.org/linus/e2a1256b17b16f9b9adf1b6fea56819e7b68e463