base: Disable unprivileged BPF by default#62
base: Disable unprivileged BPF by default#62ricardosalveti merged 1 commit intofoundriesio:masterfrom
Conversation
|
@quaresmajose could you please add the sense of this commit to the commit message. What does it fix or improve? |
|
@MrCry0 sure, I can add the help text from kernel kconfig This fix will mitigate the Spectre V2 |
Thanks. It would be helpful to add the information on which vulnerabilities this commit prevents use. In the commit message, not in the PR. Say, "Unprivileged BPF could be used to exploit certain potential speculative execution |
Disables unprivileged BPF by default by setting the corresponding /proc/sys/kernel/unprivileged_bpf_disabled knob to 2. An admin can still reenable it by setting it to 0 later on, or permanently disable it by setting it to 1 (from which no other transition to 0 is possible anymore). Unprivileged BPF could be used to exploit certain potential speculative execution side-channel vulnerabilities on unmitigated affected hardware. Disabling unprivileged BPF prevents using the vulnerability CVE-2017-5715 and some others. Signed-off-by: Jose Quaresma <[email protected]>
ricardosalveti
left a comment
There was a problem hiding this comment.
LGTM, also disabled by default in most distros.
Signed-off-by: Jose Quaresma [email protected]