Avoid speculative indirect branches in kernel
An XCCDF Rule
Description
Compile kernel with the retpoline compiler options to guard against kernel-to-user data leaks
by avoiding speculative indirect branches.
Requires a compiler with -mindirect-branch=thunk-extern support for full protection.
The kernel may run slower.
The configuration that was used to build kernel is available at /boot/config-*
.
To check the configuration value for CONFIG_RETPOLINE
, run the following command:
grep CONFIG_RETPOLINE /boot/config-*
For each kernel installed, a line with value "y" should be returned.
warning alert: Warning
There is no remediation for this besides re-compiling the kernel with the appropriate value for the config.
Rationale
This is required to enable protection against Spectre v2.
- ID
- xccdf_org.ssgproject.content_rule_kernel_config_retpoline
- Severity
- Medium
- References
- Updated