LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 01-26-2018, 04:16 AM   #31
hua
Member
 
Registered: Oct 2006
Location: Slovak Republic
Distribution: Slackware 14.2, current
Posts: 461

Rep: Reputation: 78

Quote:
Originally Posted by cwizardone View Post
It is illegal. No doubt about it. If he isn't prosecuted it is because the system has become completely corrupted. Look at what happened to the bankers responsible for the 2007/8 financial disaster, nothing.
Yep, I completely agree In case there will be no consequences it will show that there was something because of which this didn't happen. Laws are only for mortals
 
1 members found this post helpful.
Old 01-26-2018, 09:18 AM   #32
rokytnji
LQ Veteran
 
Registered: Mar 2008
Location: Waaaaay out West Texas
Distribution: antiX 23, MX 23
Posts: 7,112
Blog Entries: 21

Rep: Reputation: 3474Reputation: 3474Reputation: 3474Reputation: 3474Reputation: 3474Reputation: 3474Reputation: 3474Reputation: 3474Reputation: 3474Reputation: 3474Reputation: 3474
I'm not scared. Knowing full well the Chinese would not make any computer gear handle like the forbidden city.
Back Doors. Secret Passages. Naw. Never happen.

I'll be waiting for when the forum is flooded with

" Look at this! Embedded boards with Arm, Mip, etc..... are hackable remotely
"

My Samsung S7 Phone aint the most secure thing on the planet either. Linus is probably grinning internally also. While yelling his butt off.
 
Old 01-26-2018, 05:00 PM   #33
yvesjv
Member
 
Registered: Sep 2015
Location: Australia
Distribution: Slackware, Devuan, Freebsd
Posts: 564

Rep: Reputation: Disabled
Like many, I'm not going to upgrade my Intel cpu for the next few years :-(
Bit scared of the Intel microcode updates as Intel themselves reported unexpected reboots, etc.
Have been looking for a howto towards how to recompile/patch/mitigate the kernel against the spectre security flaws.
Is there a link and/or information available anywhere I could go through?
Thanks all.

Running the 'spectre-meltdown-checker.sh' gives:
CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
* Checking whether we're safe according to the /sys interface: NO (kernel confirms your system is vulnerable)
> STATUS: VULNERABLE (Vulnerable)

CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
* Checking whether we're safe according to the /sys interface: NO (kernel confirms your system is vulnerable)
> STATUS: VULNERABLE (Vulnerable: Minimal generic ASM retpoline)

CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
* Checking whether we're safe according to the /sys interface: YES (kernel confirms that the mitigation is active)
> STATUS: NOT VULNERABLE (Mitigation: PTI)
 
1 members found this post helpful.
Old 01-26-2018, 05:19 PM   #34
1337_powerslacker
Member
 
Registered: Nov 2009
Location: Kansas, USA
Distribution: Slackware64-15.0
Posts: 862
Blog Entries: 9

Rep: Reputation: 592Reputation: 592Reputation: 592Reputation: 592Reputation: 592Reputation: 592
Quote:
Originally Posted by chrisretusn View Post
Definitely not an expert. I tend to side with Linus Torvalds, he is an expert. His non PC "the patches are COMPLETE AND UTTER GARBAGE" resinates with me. To the point, I like that. I think this Spectre/Meltdown mess is a lot of gloom and doom posturing.

There have been many gloom and doom events over the past few years, not a single one of them has affected me. So I'm not about to hit the panic button. In fact I am quite amused over the hub-a-bub over this. I will upgrade my kernel as I always do, but I am in no rush to buy new gear. Heck, I still have a P4 machine running Widows XP I am not loosing sleep over this and I simply trust Patrick Volkerding and Linux Torvaids to do the right things. If the right things require new gear, well I guess I just live with that fact. I seriously doubt I will be affected by this latest threat anyway.

^This. I fully second this motion!! My hardware has yet to be affected by this, either. I think the tech journalists have latched on to this latest vulnerabilities and are trying to outdo each other in their posturing. As for myself, I see no need to do anything other than some software updating, sit tight, and wait this one out.
 
1 members found this post helpful.
Old 02-08-2018, 03:08 PM   #35
yvesjv
Member
 
Registered: Sep 2015
Location: Australia
Distribution: Slackware, Devuan, Freebsd
Posts: 564

Rep: Reputation: Disabled
And it is fixed!!... well until the next major Intel stuff up.

Have downloaded the latest 4.15.2 kernel @ www.kernel.org
untar in /usr/src
#yes "" | make oldconfig
did not even had to browse to see if I said yes to anything not required as I was already running the 4.15 kernel
make the kernel and modules
installed them and rebooted into it
And yes after rebooting:

bash-4.4$ sh ./spectre-meltdown-checker.sh
Spectre and Meltdown mitigation detection tool v0.31

Note that you should launch this script with root privileges to get accurate information.
We'll proceed but you might see permission denied errors.
To run it as root, you can try the following command: sudo ./spectre-meltdown-checker.sh

Checking for vulnerabilities against running kernel Linux 4.15.2-yvesjv-pc #1 SMP PREEMPT Fri Feb 9 04:49:42 ACST 2018 x86_64
CPU is Intel(R) Core(TM) i7-4720HQ CPU @ 2.60GHz

CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
* Checking whether we're safe according to the /sys interface: YES (kernel confirms that the mitigation is active)
> STATUS: NOT VULNERABLE (Mitigation: __user pointer sanitization)

CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
* Checking whether we're safe according to the /sys interface: YES (kernel confirms that the mitigation is active)
> STATUS: NOT VULNERABLE (Mitigation: Full generic retpoline)

CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
* Checking whether we're safe according to the /sys interface: YES (kernel confirms that the mitigation is active)
> STATUS: NOT VULNERABLE (Mitigation: PTI)

A false sense of security is worse than no security at all, see --disclaimer
bash-4.4$



Edit:- Noticed I used the older version of 'spectre-meltdown-checker.sh'
git cloned the latest from https://github.com/speed47/spectre-meltdown-checker.git
And even more details when running it but looks fixed:

CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
--------snipped all the details-----------
> STATUS: NOT VULNERABLE (Mitigation: __user pointer sanitization)

CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
--------snipped all the details-----------
> STATUS: NOT VULNERABLE (Mitigation: Full generic retpoline)

VE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
--------snipped all the details-----------
> STATUS: NOT VULNERABLE (Mitigation: PTI)

Last edited by yvesjv; 02-08-2018 at 03:33 PM.
 
1 members found this post helpful.
Old 02-09-2018, 06:52 AM   #36
kjhambrick
Senior Member
 
Registered: Jul 2005
Location: Round Rock, TX
Distribution: Slackware64 15.0 + Multilib
Posts: 2,159

Rep: Reputation: 1512Reputation: 1512Reputation: 1512Reputation: 1512Reputation: 1512Reputation: 1512Reputation: 1512Reputation: 1512Reputation: 1512Reputation: 1512Reputation: 1512
Quote:
Originally Posted by slac-in-the-box View Post
Do Spectre or Meltdown require physical access to a device in order to exploit it? In this case, I wouldn't worry much, as I have a vicious guard wife ...
<<snip>>
That's a keeper, slac-in-the-box.

Stolen for future usage

Thanks.

-- kjh
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Spectre and Meltdown: Explanation, Info, What's being done, What can be done Zyblin Linux - Security 7 02-17-2018 09:48 PM
LXer: Spectre and Meltdown: Linux creator Linus Torvalds criticises Intel's 'garbage' patches LXer Syndicated Linux News 0 01-23-2018 05:42 AM
Vulnerabilities such as Meltdown and Spectre caseyl Linux - Security 7 01-22-2018 09:14 PM
Meltdown and Spectre ots3go Solaris / OpenSolaris 1 01-10-2018 04:15 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 07:45 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration