lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 22 May 2020 13:55:56 -0700 From: Dave Hansen <dave.hansen@...el.com> To: Don Porter <porter@...unc.edu>, Jarkko Sakkinen <jarkko.sakkinen@...ux.intel.com>, Thomas Gleixner <tglx@...utronix.de> Cc: Andi Kleen <ak@...ux.intel.com>, Sasha Levin <sashal@...nel.org>, linux-kernel@...r.kernel.org, bp@...en8.de, luto@...nel.org, hpa@...or.com, tony.luck@...el.com, ravi.v.shankar@...el.com, chang.seok.bae@...el.com Subject: Re: [PATCH v12 00/18] Enable FSGSBASE instructions On 5/22/20 1:14 PM, Don Porter wrote: > I wanted to clarify that we never intended the Graphene kernel module > you mention for production use, as well as to comment in support of this > patch. Could you also clarify: Did you know that the FSGSBASE kernel module introduced a root vulnerability? Where did it come from in the first place?
Powered by blists - more mailing lists