Which 32-bit features are still vulnerable to "Retbleed" in the Linux kernel?
2
votes
1
answer
909
views
I'm updating my kernel to protect my system against the "Retbleed" exploit, and I know that affected 32-bit things haven't received the necessary mitigations . I'm wondering which 32-bit features I need to disable in the Linux kernel to be fully protected.
I've found
CONFIG_X86_X32_ABI
and CONFIG_IA32_EMULATION
so far. I'd like to maintain the ability to execute 32-bit binaries with reduced performance, if possible. **Which (or both) of these config options enable the exploit? Are there any other features I need to disable?**
I'm aware that some older CPUs must disable SMT to be fully protected , but my CPU is not one of them.
Asked by ATLief
(328 rep)
Aug 7, 2022, 06:52 PM
Last activity: Aug 7, 2022, 07:27 PM
Last activity: Aug 7, 2022, 07:27 PM