Forums

Skip to content

Advanced search
  • Quick links
    • Unanswered topics
    • Active topics
    • Search
  • FAQ
  • Login
  • Register
  • Board index Assistance Kernel & Hardware
  • Search

Meltdown/Spectre: Unauthorized Disclosure of Kernel Memory

Kernel not recognizing your hardware? Problems with power management or PCMCIA? What hardware is compatible with Gentoo? See here. (Only for kernels supported by Gentoo.)
Locked
Advanced search
562 posts
  • Page 2 of 23
    • Jump to page:
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 23
  • Next
Author
Message
PrSo
Tux's lil' helper
Tux's lil' helper
Posts: 136
Joined: Thu Jun 01, 2017 1:02 pm

Post by PrSo » Thu Jan 04, 2018 9:25 am

depontius wrote:So at the moment there is no protection for Spectre? Has anyone contacted James Bond?
LOL,

Funny, but it could be possible that this is backfire of "Three Letter Agency's" nonexistent backdoor. But if they are so generous to share with Brits I don't know...
Top
greyspoke
Apprentice
Apprentice
Posts: 175
Joined: Fri Jan 08, 2010 9:28 am

Post by greyspoke » Thu Jan 04, 2018 10:14 am

So if AMD and ARM are affected by spectre, does that mean it exposes a flaw in the instruction set they are implementing? Or is there some shared code with a flaw in it?
Top
gengreen
Apprentice
Apprentice
Posts: 150
Joined: Sat Dec 23, 2017 2:49 am
Contact:
Contact gengreen
Website

Post by gengreen » Thu Jan 04, 2018 10:48 am

I was informed on this in freenode #musl

As far I understand, there is 2 vulnerability :


https://meltdownattack.com

Metldown : a security patch is available at https://github.com/IAIK/KAISER/tree/master/KAISER
Spectre : There is nothing available to prevent this vulnerability.

I had a hard feeling against intel since the story with Grsecurity, now I definitively ban intel (and all thing associated with this garbage corporate) from any future purchase.

Happy new year

Edit :
Myu wrote:Not fixable by microcode ....

Also, nvidia-drivers-387.34 doesn't compile anymore with 4.14.11

Code: Select all

FATAL: modpost: GPL-incompatible module nvidia.ko uses GPL-only symbol 'cpu_tlbstate'
make[3]: *** [/usr/src/linux-4.14.11-gentoo/scripts/Makefile.modpost:92: __modpost] Error 1
Don't bother yourself with CONFIG_PAGE_TABLE_ISOLATION, it won't help since your system have already a backdoor called nvidia proprietary drivers

It's like driving a motocycle with glove for the protection of your hands but no helmet.

Edit 2 :

Response of intel available here :

https://newsroom.intel.com/news/intel-r ... -findings/
Intel believes its products are the most secure in the world and that, with the support of its partners, the current solutions to this issue provide the best possible security for its customers.
At least, they have a sense of humor
Top
Tsigorf
n00b
n00b
Posts: 18
Joined: Thu Jun 15, 2017 10:59 am

Post by Tsigorf » Thu Jan 04, 2018 11:40 am

depontius wrote:So at the moment there is no protection for Spectre? Has anyone contacted James Bond?
They just found a solution: https://twitter.com/attritionorg/status ... 3153856512
Top
Myu
Apprentice
Apprentice
User avatar
Posts: 164
Joined: Wed Oct 22, 2014 7:28 am
Location: Belgium

Post by Myu » Thu Jan 04, 2018 11:53 am

Don't bother yourself with CONFIG_PAGE_TABLE_ISOLATION, it won't help since your system have already a backdoor called nvidia proprietary drivers

It's like driving a motocycle with glove for the protection of your hands but no helmet.
While I understand your point, I would like to minimize the likeliness of having a security issue, hence why I will keep KPTI enabled.

If I could purchase an AMD GPU at a decent price, I would have done it already but with the crypto mining craze, I'm holding off still.
Gentoo stable with bits of ~amd64 // Xfce 4.13 + Compiz Reloaded.
Top
gengreen
Apprentice
Apprentice
Posts: 150
Joined: Sat Dec 23, 2017 2:49 am
Contact:
Contact gengreen
Website

Post by gengreen » Thu Jan 04, 2018 12:07 pm

Myu wrote:
Don't bother yourself with CONFIG_PAGE_TABLE_ISOLATION, it won't help since your system have already a backdoor called nvidia proprietary drivers

It's like driving a motocycle with glove for the protection of your hands but no helmet.
While I understand your point, I would like to minimize the likeliness of having a security issue, hence why I will keep KPTI enabled.

If I could purchase an AMD GPU at a decent price, I would have done it already but with the crypto mining craze, I'm holding off still.
There is no mention for now regarding the ibm power processor, only time will tell us if they are not affected by spectre, if you care about security you may be more interested by thoses processor.

Give a try to the drivers nouveau if you can
glxgears
Running synchronized to the vertical refresh. The framerate should be
approximately the same as the monitor refresh rate.
42173 frames in 5.0 seconds = 8434.567 FPS
42940 frames in 5.0 seconds = 8587.865 FPS
It's not that bad and it is opensource.
Last edited by gengreen on Thu Jan 04, 2018 12:27 pm, edited 1 time in total.
Top
yamabiko
n00b
n00b
User avatar
Posts: 10
Joined: Sat Jul 22, 2017 4:59 pm

Post by yamabiko » Thu Jan 04, 2018 12:17 pm

Is it possible to provide a patch for the current stable gentoo-sources? Manually patching it on 4.9.72 gives me an hunk fail.
Top
limn
l33t
l33t
Posts: 997
Joined: Fri May 13, 2005 8:08 pm

Post by limn » Thu Jan 04, 2018 12:18 pm

Monocultures are always bad.
Top
sligo
Tux's lil' helper
Tux's lil' helper
Posts: 93
Joined: Mon Oct 17, 2011 1:46 pm

Post by sligo » Thu Jan 04, 2018 1:24 pm

While i understand the problem, i am still a little confused. Is there something that can be done already?
Top
Tsigorf
n00b
n00b
Posts: 18
Joined: Thu Jun 15, 2017 10:59 am

Post by Tsigorf » Thu Jan 04, 2018 2:07 pm

There is a kernel patch for Linux you can apply to avoid Meltdown (the Kaiser patch set you can find here: https://lwn.net/Articles/738975/).

However for Spectre, that's an hardware issue. I don't even know if there's a way to patch our CPUs. That's why they're telling us to replace hardware.
Top
1clue
Advocate
Advocate
Posts: 2569
Joined: Sun Feb 05, 2006 3:08 am

Post by 1clue » Thu Jan 04, 2018 2:50 pm

Ralphred wrote:
1clue wrote:It would be really neat if they fixed the bug with gcc 6.4 and recent kernels. The combination of this bug and the backported kernels is really unfortunate right now.
I appreciate anecdotal evidence is mostly useless, but just built 4.14.11 with 6.4 and it's working fine, nothing funky other than the ~amd64 for the kernel in package.use
I would be happy as a clam with that, except my attempt panics inside the first second of boot. No logs written.
Top
The Main Man
Veteran
Veteran
Posts: 1173
Joined: Thu Nov 27, 2014 11:25 pm
Location: /run/user/1000

Post by The Main Man » Thu Jan 04, 2018 2:52 pm

Smells like a ploy to buy new hardware which will then have serious backdoors and kill switches.
Top
Watcom
n00b
n00b
User avatar
Posts: 21
Joined: Wed Apr 12, 2006 5:29 pm

Post by Watcom » Thu Jan 04, 2018 2:53 pm

Spectre needs:
  • A "victim" program which accepts input provided by the attacker (i.e. from the network or file). This input tricks the program to fetch cache lines based on data that is "secret".
  • A program running in the same processor, devised by the attacker, to collect the "secret" data by measuring the time it takes to fetch data from its own addressing space that uses the same cache lines. Fast access means the data was cached, slow means it wasn't. From this alone the secret data can be inferred by seeing which bytes of an array are fast and which are slow (e.g. first byte being fast means 'A', second byte fast means 'B' and so on. Not exactly this simple but it's the basic idea).
So as you can see not running untrusted code goes a long way in preventing Spectre attacks.
Top
EasterParade
l33t
l33t
User avatar
Posts: 938
Joined: Sat Jul 26, 2003 10:48 am

Post by EasterParade » Thu Jan 04, 2018 2:57 pm

(?)
Last edited by EasterParade on Fri Jan 05, 2018 10:08 pm, edited 1 time in total.
Top
PrSo
Tux's lil' helper
Tux's lil' helper
Posts: 136
Joined: Thu Jun 01, 2017 1:02 pm

Post by PrSo » Thu Jan 04, 2018 3:07 pm

This is ridiculous.
I have also QNAP NAS with intel celeron on-board - (ts-251), and waiting to upgrade a firmware.

Maybe it is an exception narrowed to Ivy Bridge but KAISER patch (PTI) BRAKES kernel.

https://lkml.org/lkml/2018/1/3/864,

and

https://lkml.org/lkml/2018/1/3/105

Should I turn it off, cut of from internet and let it work only locally??
Top
Tony0945
Watchman
Watchman
Posts: 5127
Joined: Tue Jul 25, 2006 12:19 am
Location: Illinois, USA

Post by Tony0945 » Thu Jan 04, 2018 3:13 pm

PrSo wrote:Should I turn it off, cut of from internet and let it work only locally??
Look at it this way - "Is it any worse than running Windoze XP & earlier?"
Top
sligo
Tux's lil' helper
Tux's lil' helper
Posts: 93
Joined: Mon Oct 17, 2011 1:46 pm

Post by sligo » Thu Jan 04, 2018 3:31 pm

Watcom wrote:So as you can see not running untrusted code goes a long way in preventing Spectre attacks.
Does that include Javascript?
Top
Naib
Watchman
Watchman
User avatar
Posts: 6101
Joined: Fri May 21, 2004 9:42 pm
Location: Removed by Neddy
Contact:
Contact Naib
Website

Post by Naib » Thu Jan 04, 2018 3:33 pm

Tony0945 wrote:
PrSo wrote:Should I turn it off, cut of from internet and let it work only locally??
Look at it this way - "Is it any worse than running Windoze XP & earlier?"
yes because the flaw existed with those CPU's as well. just use AMD Zen (Ryzen,threadripper)
#define HelloWorld int
#define Int main()
#define Return printf
#define Print return
#include <stdio>
HelloWorld Int {
Return("Hello, world!\n");
Print 0;
Top
Myu
Apprentice
Apprentice
User avatar
Posts: 164
Joined: Wed Oct 22, 2014 7:28 am
Location: Belgium

Post by Myu » Thu Jan 04, 2018 4:02 pm

There is no mention for now regarding the ibm power processor, only time will tell us if they are not affected by spectre, if you care about security you may be more interested by thoses processor.
Ah, I do care, but I can only go so deep in the rabbit hole, the more you know, the more it seems endless with stuff like Intel ME, ring -1 / -2 / -whatever and now this Spectre/Meltdown.
Give a try to the drivers nouveau if you can
I do some Linux 3D gaming and the poor GPU already struggles with the proprietary driver, I guess nouveau will be much worse. So yeah, an AMD GPU to pair with a nice open source driver is on my whishlist for sure !
Gentoo stable with bits of ~amd64 // Xfce 4.13 + Compiz Reloaded.
Top
gengreen
Apprentice
Apprentice
Posts: 150
Joined: Sat Dec 23, 2017 2:49 am
Contact:
Contact gengreen
Website

Post by gengreen » Thu Jan 04, 2018 4:04 pm

transsib wrote:I remember how we chatted about major loop-holes built into the shipped hardware
more than a year ago ... for spying purposes mainly.

But theories of conspiracy plots aside if it wasn't so sad I'd :lol:
Also what's all the fuss about not activating security keys in UEFI!?
Who needs those keys at all if "anyone" can theoretically (?) milk anyone via a
leak built into the CPU itself!

Sorry. That was overly chatty.
And the Intel CEO sold Intel stocks before the news hit the world.
I started to accept a while ago the fact that the security will always be compromised by volontary bug in anyway, even in the opensource code, they can just cover it up by "we made a mistake". Now we known for fact that the hardware is targeted as well, the war is lost.

Sadly, like snowden, assange before, this news will be covered for fews days and most of the poeple won't give a damn, even they known that their smartphone / computer or connected device spy on them all the day, they are willing to abandon their freedom for some fancy technology

Stupidity is a more dangerous enemy of the good than malice
Ah, I do care, but I can only go so deep in the rabbit hole, the more you know, the more it seems endless with stuff like Intel ME, ring -1 / -2 / -whatever and now this Spectre/Meltdown.
That is also true for a lot of other thing in life :D

The more I learn, the less I known
Top
pjp
Administrator
Administrator
User avatar
Posts: 20668
Joined: Tue Apr 16, 2002 10:35 pm

Re: Major security flaw found in Intel processors

Post by pjp » Thu Jan 04, 2018 4:26 pm

Fitzcarraldo wrote:Happened to see this article in today's Guardian (UK) newspaper:

https://www.theguardian.com/technology/ ... c-os-linux

Haven't looked around yet. Anyone know anything more, and when firmware updates -- I assume Intel will be fixing this via firmware updates -- will be available?
Merged this thread.
Quis separabit? Quo animo?
Top
Watcom
n00b
n00b
User avatar
Posts: 21
Joined: Wed Apr 12, 2006 5:29 pm

Post by Watcom » Thu Jan 04, 2018 5:30 pm

sligo wrote:
Watcom wrote:So as you can see not running untrusted code goes a long way in preventing Spectre attacks.
Does that include Javascript?
Yes it does, unfortunately.
Top
toofied
n00b
n00b
User avatar
Posts: 28
Joined: Wed Oct 26, 2016 1:32 pm

Post by toofied » Thu Jan 04, 2018 5:58 pm

Ant P. wrote:Everyone should have NoScript/uMatrix plus an adblocker at a bare minimum after Rowhammer.
Definitely agree! Unfortunately, many sites now require JS to have basic usability. Wix and AngularJS come to mind. Hopefully people will start refusing to participate in websites which demand javascript for basic function...
Top
Myu
Apprentice
Apprentice
User avatar
Posts: 164
Joined: Wed Oct 22, 2014 7:28 am
Location: Belgium

Post by Myu » Thu Jan 04, 2018 6:26 pm

Everyone should have NoScript/uMatrix plus an adblocker at a bare minimum after Rowhammer.

Definitely agree! Unfortunately, many sites now require JS to have basic usability. Wix and AngularJS come to mind. Hopefully people will start refusing to participate in websites which demand javascript for basic function...
I did just that, installed µMatrix + NoScript, let's see how usable it is.
Sadly, like snowden, assange before, this news will be covered for fews days and most of the poeple won't give a damn, even they known that their smartphone / computer or connected device spy on them all the day, they are willing to abandon their freedom for some fancy technology
I've no words because I know you speak the truth... :( but having to change all my hardware because the damn Intel CPU MMU security was a lie since 20+ years... it's unbelievable.
Gentoo stable with bits of ~amd64 // Xfce 4.13 + Compiz Reloaded.
Top
Naib
Watchman
Watchman
User avatar
Posts: 6101
Joined: Fri May 21, 2004 9:42 pm
Location: Removed by Neddy
Contact:
Contact Naib
Website

Post by Naib » Thu Jan 04, 2018 6:26 pm

toofied wrote:
Ant P. wrote:Everyone should have NoScript/uMatrix plus an adblocker at a bare minimum after Rowhammer.
Definitely agree! Unfortunately, many sites now require JS to have basic usability. Wix and AngularJS come to mind. Hopefully people will start refusing to participate in websites which demand javascript for basic function...
umatrix does permit per site settings
#define HelloWorld int
#define Int main()
#define Return printf
#define Print return
#include <stdio>
HelloWorld Int {
Return("Hello, world!\n");
Print 0;
Top
Locked

562 posts
  • Page 2 of 23
    • Jump to page:
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 23
  • Next

Return to “Kernel & Hardware”

Jump to
  • Assistance
  • ↳   News & Announcements
  • ↳   Frequently Asked Questions
  • ↳   Installing Gentoo
  • ↳   Multimedia
  • ↳   Desktop Environments
  • ↳   Networking & Security
  • ↳   Kernel & Hardware
  • ↳   Portage & Programming
  • ↳   Gamers & Players
  • ↳   Other Things Gentoo
  • ↳   Unsupported Software
  • Discussion & Documentation
  • ↳   Documentation, Tips & Tricks
  • ↳   Gentoo Chat
  • ↳   Gentoo Forums Feedback
  • ↳   Duplicate Threads
  • International Gentoo Users
  • ↳   中文 (Chinese)
  • ↳   Dutch
  • ↳   Finnish
  • ↳   French
  • ↳   Deutsches Forum (German)
  • ↳   Diskussionsforum
  • ↳   Deutsche Dokumentation
  • ↳   Greek
  • ↳   Forum italiano (Italian)
  • ↳   Forum di discussione italiano
  • ↳   Risorse italiane (documentazione e tools)
  • ↳   Polskie forum (Polish)
  • ↳   Instalacja i sprzęt
  • ↳   Polish OTW
  • ↳   Portuguese
  • ↳   Documentação, Ferramentas e Dicas
  • ↳   Russian
  • ↳   Scandinavian
  • ↳   Spanish
  • ↳   Other Languages
  • Architectures & Platforms
  • ↳   Gentoo on ARM
  • ↳   Gentoo on PPC
  • ↳   Gentoo on Sparc
  • ↳   Gentoo on Alternative Architectures
  • ↳   Gentoo on AMD64
  • ↳   Gentoo for Mac OS X (Portage for Mac OS X)
  • Board index
  • All times are UTC
  • Delete cookies

© 2001–2026 Gentoo Foundation, Inc.

Powered by phpBB® Forum Software © phpBB Limited

Privacy Policy

 

 

magic