The Linux kernel BPF subsystem's protection against speculative execution attacks (Spectre mitigation) can be bypassed. On affected systems, an unprivileged BPF program can exploit this vulnerability to leak the contents of arbitrary kernel memory (and therefore, of all physical memory) via a side-channel.
The Linux kernel BPF subsystem's protection against speculative execution attacks (Spectre mitigation) can be bypassed. On affected systems, an unprivileged BPF program can exploit this vulnerability to leak the contents of arbitrary kernel memory (and therefore, of all physical memory) via a side-channel.
https://www.openwall.com/lists/oss-security/2021/06/21/1 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d203b0fd863a2261e5d00b97f3d060c4c2a6db71 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fe9a5ca7e370e613a9a75a13008a3845ea759d6e https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9183671af6dbf60a1219371d4ed73e23f43b49db https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=973377ffe8148180b2651825b92ae91988141b05