Project:Security/Vulnerabilities/Spectre SWAPGS gadget vulnerability

From Gentoo Wiki
Jump to:navigation Jump to:search

Summary

Gentoo Linux has been made aware of an additional Spectre V1 like attack vector, requiring updates to the Linux kernel.

Spectre SWAPGS gadget vulnerability (CVE-2019-1125) allows an unprivileged local attacker to bypass conventional memory security restrictions to gain read access to privileged memory that would otherwise be inaccessible.

Resolution

There is no known complete mitigation other than updating the kernel and rebooting the system. This kernel patch builds on existing spectre mitigations.

Kernel updates

LTS branch Version with complete mitigation Recommended version (stabilization candidate)
4.4 >=sys-kernel/gentoo-sources-4.4.188 >=sys-kernel/gentoo-sources-4.4.189
4.9 >=sys-kernel/gentoo-sources-4.9.188 >=sys-kernel/gentoo-sources-4.9.189
4.14 >=sys-kernel/gentoo-sources-4.14.137 >=sys-kernel/gentoo-sources-4.14.138
4.19 >=sys-kernel/gentoo-sources-4.19.65 >=sys-kernel/gentoo-sources-4.19.66

Known performance impact

First tests with SWAPGS mitigation have shown to cause a performance impact. Benchmarks being worked on.

References