Forums

Skip to content

Advanced search
  • Quick links
    • Unanswered topics
    • Active topics
    • Search
  • FAQ
  • Login
  • Register
  • Board index Assistance Networking & Security
  • Search

[SOLVED] Is my laptop vulnerable or not?

Having problems getting connected to the internet or running a server? Wondering about securing your box? Ask here.
Post Reply
Advanced search
12 posts • Page 1 of 1
Author
Message
egrep
n00b
n00b
User avatar
Posts: 49
Joined: Thu Jul 16, 2020 10:19 am

[SOLVED] Is my laptop vulnerable or not?

  • Quote

Post by egrep » Mon Jul 27, 2020 5:39 pm

Hello,

I have a Lenovo laptop with a Intel Xeon E3-1200 v6/7th Gen Core Processor. It looks like I'm collecting vulnerabilities, lol. I used a guide to update my processors microcode as described here: https://wiki.gentoo.org/wiki/Intel_microcode. And after a reboot dmesg output says I have installed Intel microcode proper way:

Code: Select all

$ dmesg | grep microcode
[    0.000000] microcode: microcode updated early to revision 0xd6, date = 2020-04-23
[    0.575621] microcode: sig=0x906e9, pf=0x20, revision=0xd6
[    0.576199] microcode: Microcode Update Driver: v2.2.
But my system is still vulnerable (?) to the mds, meltdown, spectre flaws, and so on, although I used the guide to update my processors microcode:

Code: Select all

$ lscpu | grep -i vulnerab
Vulnerability Itlb multihit:     Processor vulnerable
Vulnerability L1tf:              Mitigation; PTE Inversion
Vulnerability Mds:               Mitigation; Clear CPU buffers; SMT vulnerable
Vulnerability Meltdown:          Mitigation; PTI
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl and seccomp
Vulnerability Spectre v1:        Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Vulnerability Spectre v2:        Mitigation; Full generic retpoline, IBPB conditional, IBRS_FW, STIBP conditional, RSB filling
Vulnerability Srbds:             Mitigation; Microcode
Vulnerability Tsx async abort:   Not affected

Code: Select all

$ dmesg | grep -iE '(spectre|mds|srbds)'
[    0.100599] Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
[    0.100601] Spectre V2 : Mitigation: Full generic retpoline
[    0.100603] Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
[    0.100604] Spectre V2 : Enabling Restricted Speculation for firmware calls
[    0.100606] Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier
[    0.100608] Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl
[    0.100617] SRBDS: Mitigation: Microcode
[    0.100618] MDS: Mitigation: Clear CPU buffers
[    0.109359] MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details.
I am running 5.7.10-gentoo and have no idea what else can I do. I am missing something else?

To summarize, I am interested in the question of how vulnerable my processor is. And Is there any complete guide to protection from such vulnerabilities?
Last edited by egrep on Mon Jul 27, 2020 11:39 pm, edited 1 time in total.
Top
fedeliallalinea
Administrator
Administrator
User avatar
Posts: 31987
Joined: Sat Mar 08, 2003 11:15 pm
Location: here
Contact:
Contact fedeliallalinea
Website

  • Quote

Post by fedeliallalinea » Mon Jul 27, 2020 5:49 pm

You can install app-admin/spectre-meltdown-checker package that has better output.
Questions are guaranteed in life; Answers aren't.

"Those who would give up essential liberty to purchase a little temporary safety,
deserve neither liberty nor safety."
- Ben Franklin
https://www.news.admin.ch/it/nsb?id=103968
Top
egrep
n00b
n00b
User avatar
Posts: 49
Joined: Thu Jul 16, 2020 10:19 am

  • Quote

Post by egrep » Mon Jul 27, 2020 6:04 pm

fedeliallalinea wrote:You can install app-admin/spectre-meltdown-checker package that has better output.
Well, spectre-meltdown-checker says:

Code: Select all

> SUMMARY: CVE-2017-5753:OK CVE-2017-5715:OK CVE-2017-5754:OK CVE-2018-3640:OK CVE-2018-3639:OK CVE-2018-3615:OK CVE-2018-3620:OK CVE-2018-3646:OK CVE-2018-12126:OK CVE-2018-12130:OK CVE-2018-12127:OK CVE-2019-11091:OK CVE-2019-11135:OK CVE-2018-12207:OK
e.g. there is no CVE with non-OK. Is this means everything is OK?
Top
fedeliallalinea
Administrator
Administrator
User avatar
Posts: 31987
Joined: Sat Mar 08, 2003 11:15 pm
Location: here
Contact:
Contact fedeliallalinea
Website

  • Quote

Post by fedeliallalinea » Mon Jul 27, 2020 6:21 pm

Yes but I'm not expert and I don't know if this utility checks all know issues.
Questions are guaranteed in life; Answers aren't.

"Those who would give up essential liberty to purchase a little temporary safety,
deserve neither liberty nor safety."
- Ben Franklin
https://www.news.admin.ch/it/nsb?id=103968
Top
halcon
l33t
l33t
User avatar
Posts: 736
Joined: Sun Dec 15, 2019 8:54 pm

Re: Is my laptop vulnerable or not?

  • Quote

Post by halcon » Mon Jul 27, 2020 7:13 pm

egrep wrote:

Code: Select all

Vulnerability Itlb multihit:     Processor vulnerable
AFAIK, that vulnerability is actual only if you use a virtualization with KVM: iTLB multihit.

spectre-meltdown-checker's last info block is dedicated to it. For example:

Code: Select all

CVE-2018-12207 aka 'No eXcuses, iTLB Multihit, machine check exception on page size changes (MCEPSC)'
* Mitigated according to the /sys interface:  YES  (Not affected)
* This system is a host running a hypervisor:  NO 
* iTLB Multihit mitigation is supported by kernel:  YES  (found itlb_multihit in kernel image)
* iTLB Multihit mitigation enabled and active:  NO 
> STATUS:  NOT VULNERABLE  (your CPU vendor reported your CPU model as not vulnerable)
Top
egrep
n00b
n00b
User avatar
Posts: 49
Joined: Thu Jul 16, 2020 10:19 am

  • Quote

Post by egrep » Mon Jul 27, 2020 11:39 pm

Thank you guys
Top
Hu
Administrator
Administrator
Posts: 24403
Joined: Tue Mar 06, 2007 5:38 am

Re: [SOLVED] Is my laptop vulnerable or not?

  • Quote

Post by Hu » Tue Jul 28, 2020 2:21 am

egrep wrote:It looks like I'm collecting vulnerabilities, lol.
But my system is still vulnerable (?) to the mds, meltdown, spectre flaws, and so on, although I used the guide to update my processors microcode:

Code: Select all

$ lscpu | grep -i vulnerab
Vulnerability Itlb multihit:     Processor vulnerable
Vulnerability L1tf:              Mitigation; PTE Inversion
Vulnerability Mds:               Mitigation; Clear CPU buffers; SMT vulnerable
Vulnerability Meltdown:          Mitigation; PTI
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl and seccomp
Vulnerability Spectre v1:        Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Vulnerability Spectre v2:        Mitigation; Full generic retpoline, IBPB conditional, IBRS_FW, STIBP conditional, RSB filling
Vulnerability Srbds:             Mitigation; Microcode
Vulnerability Tsx async abort:   Not affected
Not quite. As I read this:
  • You are still fully impacted by itlb.
  • For MDS, you are still affected if SMT is used.
  • For all the others, software mitigations (which impair system performance) are present and attempt to mitigate the problem.
egrep wrote:I am running 5.7.10-gentoo and have no idea what else can I do. I am missing something else?
What else do you want to do? Which of these vulnerabilities apply to how you use your system?
Top
Ant P.
Watchman
Watchman
Posts: 6920
Joined: Sat Apr 18, 2009 7:18 pm
Contact:
Contact Ant P.
Website

  • Quote

Post by Ant P. » Tue Jul 28, 2020 3:27 am

There are changes coming in Linux 5.8 (.9?) to make SMT less dangerous without having to disable it outright. That's probably a long way off though.
Top
NeddySeagoon
Administrator
Administrator
User avatar
Posts: 56104
Joined: Sat Jul 05, 2003 9:37 am
Location: 56N 3W

  • Quote

Post by NeddySeagoon » Tue Jul 28, 2020 9:23 am

egrep,

We are all vulnerable. :)
Regards,

NeddySeagoon

Computer users fall into two groups:-
those that do backups
those that have never had a hard drive fail.
Top
egrep
n00b
n00b
User avatar
Posts: 49
Joined: Thu Jul 16, 2020 10:19 am

Re: [SOLVED] Is my laptop vulnerable or not?

  • Quote

Post by egrep » Tue Jul 28, 2020 1:47 pm

Hu wrote:What else do you want to do? Which of these vulnerabilities apply to how you use your system?
Well, my daily usage of this workstation is to read news (rss), check mail (thunderbird), write simple code (emacs), do some local research and read books (evince). Probably I could count all the unique web-sites that I visit for a month and this number would not exceed 20. That's probably all. I'm just interested in doing the best that I can. However, I would not want to sacrifice performance because of the mythical hack possibility.
Top
egrep
n00b
n00b
User avatar
Posts: 49
Joined: Thu Jul 16, 2020 10:19 am

  • Quote

Post by egrep » Tue Jul 28, 2020 1:50 pm

NeddySeagoon wrote:egrep,

We are all vulnerable. :)


Haha, This is certainly true! However, I am not prone to fanatical defense.
Top
Hu
Administrator
Administrator
Posts: 24403
Joined: Tue Mar 06, 2007 5:38 am

  • Quote

Post by Hu » Wed Jul 29, 2020 2:19 am

Based on that usage pattern, I think using a browser is probably your single greatest risk. Modern browsers are bloated monstrosities with uncounted lurking vulnerabilities due to the desire to have them do all sorts of things (WebGL, asynchronous page content, inline videos with sound, inline video-conferencing, etc.), usually without user preapproval, and sometimes without any way for the user to withhold consent other than refusing to visit the offending site. Keeping your number of sites down is helpful, but not sufficient, because those sites could suffer a breach and begin serving dangerous content. Realistically, unless you visit sites that would be a high priority target due to extreme popularity, the processor flaws probably will not matter.
Top
Post Reply

12 posts • Page 1 of 1

Return to “Networking & Security”

Jump to
  • Assistance
  • ↳   News & Announcements
  • ↳   Frequently Asked Questions
  • ↳   Installing Gentoo
  • ↳   Multimedia
  • ↳   Desktop Environments
  • ↳   Networking & Security
  • ↳   Kernel & Hardware
  • ↳   Portage & Programming
  • ↳   Gamers & Players
  • ↳   Other Things Gentoo
  • ↳   Unsupported Software
  • Discussion & Documentation
  • ↳   Documentation, Tips & Tricks
  • ↳   Gentoo Chat
  • ↳   Gentoo Forums Feedback
  • ↳   Duplicate Threads
  • International Gentoo Users
  • ↳   中文 (Chinese)
  • ↳   Dutch
  • ↳   Finnish
  • ↳   French
  • ↳   Deutsches Forum (German)
  • ↳   Diskussionsforum
  • ↳   Deutsche Dokumentation
  • ↳   Greek
  • ↳   Forum italiano (Italian)
  • ↳   Forum di discussione italiano
  • ↳   Risorse italiane (documentazione e tools)
  • ↳   Polskie forum (Polish)
  • ↳   Instalacja i sprzęt
  • ↳   Polish OTW
  • ↳   Portuguese
  • ↳   Documentação, Ferramentas e Dicas
  • ↳   Russian
  • ↳   Scandinavian
  • ↳   Spanish
  • ↳   Other Languages
  • Architectures & Platforms
  • ↳   Gentoo on ARM
  • ↳   Gentoo on PPC
  • ↳   Gentoo on Sparc
  • ↳   Gentoo on Alternative Architectures
  • ↳   Gentoo on AMD64
  • ↳   Gentoo for Mac OS X (Portage for Mac OS X)
  • Board index
  • All times are UTC
  • Delete cookies

© 2001–2026 Gentoo Foundation, Inc.

Powered by phpBB® Forum Software © phpBB Limited

Privacy Policy

 

 

magic