[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Ancora su Spectre e Meltdown



Buonasera lista

Ho scaricato il tool messo a disposizione su GitHub https://github.com/speed47/spectre-meltdown-checker/blob/master/spectre-meltdown-checker.sh per controllare se il proprio sistema è disponibile.

Ho installato il l'ultimo pacchetto intel-microcode (datato 8 gennaio 2018), eppure mi ritrovo ancora il sistema vulnerabile nella parte iniziale del secondo attacco...
Immagino che per mitigare gli altri attacchi debba aspettare almeno 4.5, giusto?

SID

# ./spectre-meltdown-checker-0.31/spectre-meltdown-checker.sh  
Spectre and Meltdown mitigation detection tool v0.31

Checking for vulnerabilities against running kernel Linux 4.14.0-1-amd64 #1 SMP Debian 4.14.2-1 (2017-11-30) x86_64
CPU is Intel(R) Core(TM) i5-2450M CPU @ 2.50GHz

CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
* Checking count of LFENCE opcodes in kernel:  NO  
> STATUS:  VULNERABLE  (only 23 opcodes found, should be >= 70, heuristic to be improved when official patches become av
ailable)

CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
* Mitigation 1
*   Hardware (CPU microcode) support for mitigation
*     The SPEC_CTRL MSR is available:  NO  
*     The SPEC_CTRL CPUID feature bit is set:  NO  
*   Kernel support for IBRS:  NO  
*   IBRS enabled for Kernel space:  NO  
*   IBRS enabled for User space:  NO  
* Mitigation 2
*   Kernel compiled with retpoline option:  NO  
*   Kernel compiled with a retpoline-aware compiler:  NO  
> STATUS:  VULNERABLE  (IBRS hardware + kernel support OR kernel with retpoline are needed to mitigate the vulnerability
)

CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'                                                     
* Kernel supports Page Table Isolation (PTI):  NO                                                                        
* PTI enabled and active:  NO                                                                                            
* Checking if we're running under Xen PV (64 bits):  NO                                                                  
> STATUS:  VULNERABLE  (PTI is needed to mitigate the vulnerability)  

Luca

Reply to: