Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre".

Nick Clifton nickc@redhat.com
Mon Jan 8 11:16:00 GMT 2018


Hi Sri,

> Patch attached for the gold linker.

Did I miss something, or has this patch only been submitted for the gold linker
and not the bfd linker ?


>> This "retpoline" mitigation is fully described in the following blog post:
>> https://support.google.com/faqs/answer/7625886

I think that it might be useful to include this link in the documentation
for the -z retpolineplt option.


It occurs to me that it might also be useful to be able to mark a binary
as having been linked with this option, so that the loader (or a static
tool) can check, and if desired, reject a binary as being insecure.

Cheers
  Nick



More information about the Binutils mailing list