>On Tue, 17 Oct 2023 10:57:41 -0500, Justin <r...@neoquasar.org> wrote:
>> Similar issue in Gentoo:
>> https://bugs.gentoo.org/show_bug.cgi?id=862201
>>
>> Similar issue in FreeBSD, more recent, but different processor:
>> https://forums.freebsd.org/threads/illegal-instruction-after-12-4-upgrade-i386.89353/
>>
>> Relevant GCC commit:
>> https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=77d372abec0fbf2cfe922e3140ee3410248f979e
>
> The corresponding Debian issue are probably #1004893 and #1043281
> which was boiled down to a GCC issue, #1005863 and
> https://gcc.gnu.org/bugzilla/show_bug.cgi?id=104713
>
> As the sudo maintainer, I am reluctant to turn off a hardening feature
> to support ancient CPUs. I would be reluctant to do that for a normal
> package, but ESPECIALLY for a package like sudo which is installed
> nearly everywhere and contains an suid root binary.
>
> I am willing to consider arguments and Ctte advice, but as things are
> now I am fine with the current state.

Hello.

I've recently acquired a Vortex86DX3 machine and found about this bug. This
machine, while even being SSE1-capable, crashes with a SIGILL if ENDBR32
instructions are encountered. So far, sudo has been the only issue I've
encountered.

I am working on getting a patch merged on the Linux kernel to simply
skip over these instructions when they raise an exception, and another
kernel developer was confused to see ENDBR32 in IA32 because the kernel's
IA32 vDSO is not CET-compliant, so CET would AFAIK not protect against
anything in an IA32 environment (or IA32 running under IA64):
https://lore.kernel.org/all/9eded468-ab68-4558-8d94-c3756170c...@zytor.com/

Would it be acceptable to, rather than disable it entirely as previously
proposed, enable CET only when compiling for IA64 (amd64), but not for any
other architecture?

Hardware that support it for sure would still be protected that way, while
it would allow running sudo again on older hardware that all other
Debian packages support just fine.

Greetings,
Marcos

Reply via email to