[RESOLVED] Spectre V2 Vulnerability
Liquorix Kernel is vulnerable to:
[ 0.062079] Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! because of: #grep CONFIG_BPF_UNPRIV_DEFAULT_OFF /boot/config-6.6.4-1-liquorix-amd64 # CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set On Pop!_OS default kernel I have: #grep CONFIG_BPF_UNPRIV_DEFAULT_OFF /boot/config-6.5.6-76060506-generic CONFIG_BPF_UNPRIV_DEFAULT_OFF=y Is there any reason for this? Thanks in advance. Back to top |
|||||
No reason, it appears this was set during a regular config refresh between major kernel versions.
Thanks for the report, the change is staged for the next release: github.com/damentz/liquorix-package/commit/7c2006fb37b3fe98b607d99c6597fd19b27858ac I'll mark this as resolved. Back to top |
|||||
It is indeed:
[ 0.062183] Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization [ 0.062185] Spectre V2 : Mitigation: Enhanced / Automatic IBRS [ 0.062185] Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch [ 0.062185] Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT [ 0.062186] Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Thanks for the quick action. Back to top |
|||||
All times are GMT - 8 Hours
|