Keresés

Új hozzászólás Aktív témák

  • ubyegon2

    félisten

    válasz growler #57969 üzenetére

    A Toshiba Satellite-en nekem is ugyanúgy sérülékenynek jelzi az első két tételt 4.15-ös kernellel.

    A 4.4.0-113.136~retpoline2 is fenn van már itt ppa:canonical-kernel-team/spectre amúgy, próbáld ki.

    Candidate kernels for CVE-2017-5715 and CVE-2017-5753.

    Meló befejeztével én is kipróbálom, most desktopon nincs értelme, mert AMD APU-s.

  • Frawly

    veterán

    válasz growler #57969 üzenetére

    Melyik SM checkerrel nézed? A speed47-félével? Hányas verzió?

    A 4.15-nek Spectre2 és Meltdown ellen foltozva kéne lennie Retpoline-nal és (K)TPI-vel. Spectre1 ellen csak a 4.16-ban lesz patch, addig meg még az emberek többsége sebezhető marad.

    Én is felpasszintottam Arch stagingből a 4.15-öt, nálam ezt írja:

    Spectre and Meltdown mitigation detection tool v0.33+

    Checking for vulnerabilities on current system
    Kernel is Linux 4.15.0-1-ARCH #1 SMP Mon Jan 29 04:41:41 UTC 2018 x86_64
    CPU is Intel(R) Core(TM) i7-2620M CPU @ 2.70GHz

    Hardware check
    * Hardware support (CPU microcode) for mitigation techniques
    * Indirect Branch Restricted Speculation (IBRS)
    * SPEC_CTRL MSR is available: NO
    * CPU indicates IBRS capability: NO
    * Indirect Branch Prediction Barrier (IBPB)
    * PRED_CMD MSR is available: NO
    * CPU indicates IBPB capability: NO
    * Single Thread Indirect Branch Predictors (STIBP)
    * SPEC_CTRL MSR is available: NO
    * CPU indicates STIBP capability: NO
    * Enhanced IBRS (IBRS_ALL)
    * CPU indicates ARCH_CAPABILITIES MSR availability: NO
    * ARCH_CAPABILITIES MSR advertises IBRS_ALL capability: NO
    * CPU explicitly indicates not being vulnerable to Meltdown (RDCL_NO): NO
    * CPU microcode is known to cause stability problems: NO
    * CPU vulnerability to the three speculative execution attacks variants
    * Vulnerable to Variant 1: YES
    * Vulnerable to Variant 2: YES
    * Vulnerable to Variant 3: YES

    CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
    * Checking count of LFENCE opcodes in kernel: NO
    > STATUS: VULNERABLE (only 61 opcodes found, should be >= 70, heuristic to be improved when official patches become available)

    CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
    * Mitigation 1
    * Kernel is compiled with IBRS/IBPB support: NO
    * Currently enabled features
    * IBRS enabled for Kernel space: NO
    * IBRS enabled for User space: NO
    * IBPB enabled: NO
    * Mitigation 2
    * Kernel compiled with retpoline option: YES
    * Kernel compiled with a retpoline-aware compiler: YES (kernel reports full retpoline compilation)
    * Retpoline enabled: YES
    > STATUS: NOT VULNERABLE (retpoline mitigates the vulnerability)

    CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
    * Kernel supports Page Table Isolation (PTI): YES
    * PTI enabled and active: YES
    * Running as a Xen PV DomU: NO
    > STATUS: NOT VULNERABLE (PTI mitigates the vulnerability)

Új hozzászólás Aktív témák