Linux Security News Archives

Torvalds On Linux Security Modules: "I Already Think We Have Too Many Of Those Pointless Things"

Stemming from a security researcher and his team proposing a new Linux Security Module (LSM) three years ago and it not being accepted to the mainline kernel, he raised issue over the lack of review/action to Linus Torvalds and the mailing lists. In particular, seeking more guidance for how new LSMs should be introduced and raised the possibility of taking the issue to the Linux Foundation Technical Advisory Board (TAB).

15 December 2025 - Linus Torvalds On LSM - 82 Comments
Scoped User Access In Linux 6.19 To Reduce Speculation Barriers & Its Performance Hit

Merged yesterday to the Linux 6.19 Git codebase was the "core/uaccess" pull that introduces new scoped user-mode access with auto-cleanup functionality. This can reduce the number of speculation barriers encountered when needing to access user-mode memory and thereby avoiding some of the performance penalties incurred by speculation barriers.

3 December 2025 - Scoped User Mode Access - 3 Comments
AMD Dev Proposes Dynamic Mitigations For Linux: Run-Time Toggling Of CPU Mitigations

A big patch series was posted today for the Linux kernel that would allow enabling/disabling CPU security mitigations at run-time rather than the current handling that can only be managed at boot-time via various Linux kernel command-line arguments. Thus due to changing security needs, differing workloads mandating different CPU security concerns and the like, this proposed feature would allow Spectre, Meltdown, and other CPU security mitigations to all be toggled at run-time.

13 October 2025 - Linux Dynamic Mitigations - 21 Comments
Linux Now Disabling TPM Bus Encryption By Default For Performance Reasons

Introduced last year in Linux 6.10 was TPM bus encryption and integration protection for Trusted Platform Module 2 (TPM2) handling. The intent was on better TPM security after a prior security demonstration showed TPM key recovery from Microsoft Windows BitLocker as well as TPM sniffing attacks. Shortly after being merged it was limited to just an x86_64 default where it had been tested the most at the time. Now more than one year later, this feature is being disabled by default in the mainline Linux kernel.

10 October 2025 - TCG_TPM2_HMAC - 27 Comments
Attack Vector Controls Can Now Manage VMSCAPE Mitigation

Made public and mitigated within the mainline Linux kernel last month was the VMSCAPE vulnerability affecting both AMD and Intel CPUs. Now merged for the in-development Linux 6.18 kernel is adding VMSCAPE to the recently-introduced Attack Vector Controls functionality.

1 October 2025 - Attack Vector Controls + VMSCAPE - 5 Comments
Intel Posts New Linux Patches To Reduce Overhead Of VMSCAPE Mitigation

Earlier this month the VMSCAPE CPU security vulnerability was made public and affecting both AMD and Intel processors. VMSCAPE can lead to leaking information from a user-space hypervisor via speculative side channels. An Intel engineer today posted a new set of patches for helping to reduce the mitigation costs of VMSCAPE protections on modern Intel processors.

25 September 2025 - Less Costly VMSCAPE - Add A Comment
Linux 6.17-rc2 To Better Tune Attack Vector Controls For SRSO Mitigation

One of the new exciting security features with Linux 6.17 is Attack Vector Controls as a means of easier managing CPU security mitigations depending upon the system/server use-case. It drastically simplifies CPU security mitigation management for only activating the mitigations relevant to intended use. With the Linux 6.17-rc2 kernel due out later today, Attack Vector Controls refines its logic around the Speculative Return Stack Overflow (SRSO) mitigation.

17 August 2025 - Linux 6.17 - 1 Comment
Linux Address Space Isolation "ASI" Revived After Lowering 70% Performance Hit To 13%

Several years ago Google engineers began exploring address space isolation for the Linux kernel and ultimately proposing Linux ASI for better dealing with CPU speculative execution attacks. While the hope was it would better cope with the ever growing list of CPU speculative execution vulnerabilities, the effort was thwarted initially by I/O throughput seeing a 70% performance hit. That level of performance cost was unsustainable. But now that I/O overhead has been reduced to just 13%.

12 August 2025 - ASI - 8 Comments
Linux's Trusted Security Manager Sees First Updates In Over A Year

Merged back in late 2023 for Linux 6.7 was a cross-vendor solution for confidential computing attestation reports with the Linux Trusted Security Manager (TSM). In the succeeding kernel releases there weren't any further TSM updates issued but now for Linux 6.16 there finally is renewed work on this confidential computing code.

31 May 2025 - Trusted Security Manager - Add A Comment
Continued Work On Attack Vector Controls Ahead Of Linux 6.16

Going back to last year an AMD engineer has been pursuing "Attack Vecotr Controls" to rethink CPU security mitigation handling. Attack Vector Controls aims to make it easier to manage CPU security mitigation settings by focusing on the class/scope of vulnerabilities rather than managing the mitigations at an individual level. It's looking like the initial attack vectors control code will be ready for mainlining in the upcoming Linux 6.16 cycle but stopping short of the complete implementation.

2 May 2025 - Attack Vector Controls - Add A Comment
Linux 6.15 Lands Patches To Further Clean Up Its Spectre RSB Mitigations

Merged today was this week's batch of x86 fixes ahead of the Linux 6.15-rc2 release on Sunday. Notable with these x86 fixes are landing several patches to fix and clean-up the Spectre Return Stack Buffer "RSB" mitigation handling as well as introducing a new document to clarify the overall state and current mitigations.

10 April 2025 - Return Stack Buffer - 1 Comment
MSEAL Protection Of System Mappings Merged For Linux 6.15

In addition to all of the memory management "MM" changes merged for the Linux 6.15 kernel, a secondary round of MM updates was submitted and subsequently merged for this next kernel version. Interesting here is using the recent MSEAL system call for being able to now seal system mappings.

4 April 2025 - mseal system mappings - Add A Comment
Linux's FineIBT Protections "Critically Flawed" Until Intel CPUs Appear With FRED

FineIBT is a Linux kernel initiative led by Intel engineers that aimed to combine the best of Intel Control-flow Enforcement Technology (CET) and Control Flow Integrity. FineIBT was merged in 2022 for the Linux 6.2 kernel as an alternative control flow integrity implementation. Some FineIBT weaknesses were previously addressed but now the implementation has been determined to be "critically flawed" at least until next-generation Intel processors appear with FRED.

21 February 2025 - FineIBT Broken - 8 Comments
Linux FineIBT-BHI Updated For Toughening Up FineIBT Kernel Defenses

Intel Linux engineer Peter Zijlstra has updated his set of patches implementing FineIBT-BHI mitigations for toughening up the FineIBT kernel protections previously introduced. This FineIBT-BHI code depends upon newly-merged code for the LLVM Clang compiler as part of the compiler defenses.

9 February 2025 - Linux FineIBT-BHI - Add A Comment
Experimental Linux Address Space Isolation "ASI" v2 Patches: I/O Throughput Lower By 70%

Google engineers and others have been talking about Address Space Isolation "ASI" for the Linux kernel to better deal with speculative execution attacks and other CPU vulnerabilities. Last summer there were some new "request for comments" patches working on Linux Address Space Isolation and today a second iteration of those RFC patches were published. They are now out for review but they are unlikely to see much use: the I/O throughput as measured by FIO takes a 70% hit.

10 January 2025 - Linux ASI v2 - 8 Comments
New Linux Patch Lets You Force CPU Bugs/Mitigations Even When Not Vulnerable

While most users frown upon the increasing number of CPU security mitigations in part due to the additional overhead commonly introduced, a new Linux kernel patch by a Google engineer would allow users/developers to opt-in to forcing CPU bugs and their mitigations even if the system in use isn't known to be vulnerable.

19 November 2024 - force_cpu_bug= - 8 Comments
OpenPaX Announced As "Open-Source Alternative To GrSecurity" With Free Kernel Patch

Enterprise security firm Edera today is announcing OpenPaX that they promoted in their advance press notice as a "new open-source alternative to GrSecurity." GrSecurity being the firm focused on providing out-of-tree Linux kernel patches focused in the name of security enhancements. With OpenPaX they are open-source and publicly available kernel patch for mitigating common memory safety errors and other system hardening.

30 October 2024 - OpenPaX - 21 Comments
Linux 6.12 Adds Build Options For Greater Control Over CPU Security Mitigations

Not to be confused with the proposal a few days ago by an AMD engineer for Attack Vector Controls for broader control over CPU security mitigation handling, the in-development Linux 6.12 kernel is adding new Kconfig options to allow for more build-time control over what CPU security mitigation code is compiled for the kernel.

18 September 2024 - Linux 6.12 Kconfig Options - 2 Comments
Linux 6.12 Landing Integrity Policy Enforcement "IPE" Module

Merged as part of the Linux Security Modules (LSM) updates for the Linux 6.12 kernel is the new Integrity Policy Enforcement (IPE) module that has been years in the making. Integrity Policy Enforcement is an alternative to access controls.

18 September 2024 - Linux 6.12 IPE - 1 Comment
AMD Engineer Proposes "Attack Vector Controls" To Rethink CPU Security Mitigation Handling

David Kaplan who is a Senior Fellow at AMD focused on security technologies has published an initial set of Linux kernel patches for "Attack Vector Controls" in rethinking the CPU security mitigation handling. The proposed Attack Vector Controls makes it easier to manage desired security mitigations to have enabled/disabled based upon intent of the system rather than having to be knowledgeable about individual CPU security vulnerabilities and the various tuning knobs.

13 September 2024 - Attack Vector Controls - 17 Comments
Linux's Landlock Sandboxed Apps Could Remove Restrictions On Itself

Merged back in 2021 for Linux 5.13 was Landlock as a means of unprivileged application sandboxing. The Landlock Linux security module has continued to be improved since but it turns out there's been a big hole within this security module since its introduction... The possibility for apps to drop restrictions on itself.

28 July 2024 - Landlock Bug - 39 Comments
Linux 6.11 To Allow Tightening Of /proc/[pid]/mem Access For Better Security

Linux engineer Christian Brauner at Microsoft sent out his various pull requests for areas of the kernel he oversees ahead of the Linux 6.11 merge window. One of the more interesting pull requests from Brauner this cycle are the "vfs procfs" updates that now allow restricting access to the /proc/[pid]/mem files of processes.

14 July 2024 - Restricting mem - 65 Comments
Linus Torvalds Unconvinced By getrandom() In The vDSO

While there were plans of adding getrandom() in the vDSO with the upcoming Linux 6.11 merge window to speed up user-space random number generation access, Linus Torvalds is unconvinced by the work and intends to reject any pull request with it for Linux 6.11.

5 July 2024 - Random In The vDSO - 22 Comments
getrandom() In The vDSO Aims For Linux 6.11 To Provide Faster Yet Secure User-Space RNG

In the making the past two years by developer Jason Donenfeld (of WireGuard fame) is adding getrandom() to the vDSO in the name of better performance. In some tests this has yielded as much as a ~15x speed-up to performance for user-space obtaining crypographically secure random number generation. It's looking like for the upcoming Linux 6.11 merge window, this work will finally be merged.

3 July 2024 - Random Number Generation - Add A Comment
"Indirector" Attack Disclosed For Intel Alder Lake & Raptor Lake CPUs

UC San Diego researchers have gone public with Indirector, high-precision branch target injection attacks on the indirect branch predictor. This UCSD security researchers found Indirector impacting recent Intel Alder Lake and Raptor Lake processors. Intel believes though that no further mitigations are required.

3 July 2024 - Indirector Attack - 87 Comments

338 Linux Security news articles published on Phoronix.