x86 KASLR base exposed due to lack of entry trampoline (EntryBleed, CVE-2022-4543) #361
Labels
[ARCH] x86_64
Needed on the 64-bit x86 architecture (ARCH=x86)
[Defense] information exposure
Provide a defense for an information exposure
https://www.willsroot.io/2022/12/entrybleed.html
From v4.20 on, after KPTI was implemented, which had a fixed-location syscall entry trampoline, the trampoline was removed. This exposes the actual kernel mapping address via prefetch, etc. We need to restore this trampoline.
The text was updated successfully, but these errors were encountered: