Siduction Forum > Upgrade Warnings
Info about Meltdown and Spectre Bugs
whistler_mb:
Here is mine
--- Code: ---Spectre and Meltdown mitigation detection tool v0.31
Checking for vulnerabilities against running kernel Linux 4.14.13-towo.2-siduction-amd64 #1 SMP PREEMPT siduction 4.14-24 (2018-01-15) x86_64
CPU is Intel(R) Core(TM) i7-4702MQ CPU @ 2.20GHz
CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
* Checking whether we're safe according to the /sys interface: NO (kernel confirms your system is vulnerable)
> STATUS: VULNERABLE (Vulnerable)
CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
* Checking whether we're safe according to the /sys interface: NO (kernel confirms your system is vulnerable)
> STATUS: VULNERABLE (Vulnerable: Minimal generic ASM retpoline)
CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
* Checking whether we're safe according to the /sys interface: YES (kernel confirms that the mitigation is active)
> STATUS: NOT VULNERABLE (Mitigation: PTI)
A false sense of security is worse than no security at all, see --disclaimer
--- End code ---
threepio:
Thanks a lot for this very good info.
I don`t need it for SIDU, it is safe, but it is helpfully for others in Linux community. :)
devil:
The vulnerability against Spectre might be mitigated after the weekend if:
Kernel 4.15 is released (most likely)
and
GCC 7.3 is released in Debian (needed to build 4.15 in a useful way (where it makes use of Retpoline-Patches against Spectre-Types Variant 1 (Bounds Check Bypass) and Variant 2 (Branch Target Injection)).
ayla:
http://www.tagesschau.de/wirtschaft/intel-update-101.html
devil:
Flog heut mittag auch hier beim d-u. Dazu auch: https://linuxnews.de/2018/01/23/intel-zieht-microcode-gegen-spectre-zurueck/
Navigation
[0] Message Index
[#] Next page
[*] Previous page
Go to full version