Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 4 Jan 2018 11:18:10 -0700
From:      Gordon Tetlow <gordon@tetlows.org>
To:        Julian Elischer <julian@freebsd.org>
Cc:        Lev Serebryakov <lev@freebsd.org>,  "freebsd-security@freebsd.org" <freebsd-security@freebsd.org>
Subject:   Re: clang way to patch for Spectre?
Message-ID:  <CAKghNw2Fy9JP7Acrj_nuyJ_rEX7LvYmjGd7okyxcvQuYT0=-Ow@mail.gmail.com>
In-Reply-To: <43417734-d420-5be9-333b-8d0d02d7a58a@freebsd.org>
References:  <291645341.20180104190237@serebryakov.spb.ru> <43417734-d420-5be9-333b-8d0d02d7a58a@freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Jan 4, 2018 at 10:49 AM, Julian Elischer <julian@freebsd.org> wrote:
> On 5/1/18 12:02 am, Lev Serebryakov wrote:
>>
>> Hello Freebsd-security,
>>
>> https://reviews.llvm.org/D41723
>>
>>
> not really..
>
> What's to stop an unprivileged used bringing his own compiler? or a
> precompiled binary?

If I'm reading this right (and there is a good chance I'm not), since
unprivileged users don't bring the kernel or system libraries to the
system, the mitigations would still work.

Gordon



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAKghNw2Fy9JP7Acrj_nuyJ_rEX7LvYmjGd7okyxcvQuYT0=-Ow>