<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://dev1galaxy.org/extern.php?action=feed&amp;tid=2850&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / ZombieLoad Attack (CVE-2018-12130), hyperthreading -how to disable it?]]></title>
		<link>https://dev1galaxy.org/viewtopic.php?id=2850</link>
		<description><![CDATA[The most recent posts in ZombieLoad Attack (CVE-2018-12130), hyperthreading -how to disable it?.]]></description>
		<lastBuildDate>Wed, 28 Aug 2019 16:59:07 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: ZombieLoad Attack (CVE-2018-12130), hyperthreading -how to disable it?]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=17564#p17564</link>
			<description><![CDATA[<div class="quotebox"><cite>boycottsystemd wrote:</cite><blockquote><div><p>(... I suppose you are using latest firmware...)</p></div></blockquote></div><p>That is correct.</p><p>Phil</p>]]></description>
			<author><![CDATA[dummy@example.com (pcalvert)]]></author>
			<pubDate>Wed, 28 Aug 2019 16:59:07 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=17564#p17564</guid>
		</item>
		<item>
			<title><![CDATA[Re: ZombieLoad Attack (CVE-2018-12130), hyperthreading -how to disable it?]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=17560#p17560</link>
			<description><![CDATA[<div class="quotebox"><cite>pcalvert wrote:</cite><blockquote><div><p>Here&#039;s mine:</p><div class="codebox"><pre><code># grep -R . /sys/devices/system/cpu/vulnerabilities
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI</code></pre></div><p>Doesn&#039;t look good. <img src="https://dev1galaxy.org/img/smilies/sad.png" width="15" height="15" alt="sad" /></p><p>Phil</p></div></blockquote></div><p>(... I suppose you are using latest firmware...)</p>]]></description>
			<author><![CDATA[dummy@example.com (boycottsystemd)]]></author>
			<pubDate>Tue, 27 Aug 2019 18:12:58 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=17560#p17560</guid>
		</item>
		<item>
			<title><![CDATA[Re: ZombieLoad Attack (CVE-2018-12130), hyperthreading -how to disable it?]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=17536#p17536</link>
			<description><![CDATA[<p>Here&#039;s mine:</p><div class="codebox"><pre><code># grep -R . /sys/devices/system/cpu/vulnerabilities
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI</code></pre></div><p>Doesn&#039;t look good. <img src="https://dev1galaxy.org/img/smilies/sad.png" width="15" height="15" alt="sad" /></p><p>Phil</p>]]></description>
			<author><![CDATA[dummy@example.com (pcalvert)]]></author>
			<pubDate>Mon, 26 Aug 2019 16:42:29 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=17536#p17536</guid>
		</item>
		<item>
			<title><![CDATA[Re: ZombieLoad Attack (CVE-2018-12130), hyperthreading -how to disable it?]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=17530#p17530</link>
			<description><![CDATA[<div class="quotebox"><cite>Head_on_a_Stick wrote:</cite><blockquote><div><div class="quotebox"><cite>boycottsystemd wrote:</cite><blockquote><div><p>I&#039;ve booted ASCII kernel with <span class="bbc">noht</span> parameter.</p></div></blockquote></div><p>The parameter you want is <span class="bbc">nosmt</span>.</p><p>You also need the 2019-05-14 version of the intel-microcode package and the most recent kernel version (4.9.168-1+deb9u2, install the linux-image-amd64 metapackage to get this).</p><p>EDIT: you already have the kernel.</p><p>Use this to check vulnerabilities:</p><div class="codebox"><pre><code>grep -R . /sys/devices/system/cpu/vulnerabilities</code></pre></div><p>The <em>zombieload</em> vulnerability corresponds to <em>MDS</em> in the /sys checklist.</p></div></blockquote></div><p>Thank you and apology for delay.</p><div class="codebox"><pre><code># grep -R . /sys/devices/system/cpu/vulnerabilities
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, RSB filling
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI</code></pre></div>]]></description>
			<author><![CDATA[dummy@example.com (boycottsystemd)]]></author>
			<pubDate>Mon, 26 Aug 2019 06:24:05 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=17530#p17530</guid>
		</item>
		<item>
			<title><![CDATA[Re: ZombieLoad Attack (CVE-2018-12130), hyperthreading -how to disable it?]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=16088#p16088</link>
			<description><![CDATA[<div class="quotebox"><cite>boycottsystemd wrote:</cite><blockquote><div><p>I&#039;ve booted ASCII kernel with <span class="bbc">noht</span> parameter.</p></div></blockquote></div><p>The parameter you want is <span class="bbc">nosmt</span>.</p><p>You also need the 2019-05-14 version of the intel-microcode package and the most recent kernel version (4.9.168-1+deb9u2, install the linux-image-amd64 metapackage to get this).</p><p>EDIT: you already have the kernel.</p><p>Use this to check vulnerabilities:</p><div class="codebox"><pre><code>grep -R . /sys/devices/system/cpu/vulnerabilities</code></pre></div><p>The <em>zombieload</em> vulnerability corresponds to <em>MDS</em> in the /sys checklist.</p>]]></description>
			<author><![CDATA[dummy@example.com (Head_on_a_Stick)]]></author>
			<pubDate>Thu, 16 May 2019 15:21:13 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=16088#p16088</guid>
		</item>
		<item>
			<title><![CDATA[Re: ZombieLoad Attack (CVE-2018-12130), hyperthreading -how to disable it?]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=16087#p16087</link>
			<description><![CDATA[<div class="quotebox"><cite>boycottsystemd wrote:</cite><blockquote><div><p>There is anoher intel vulnerability which uses hyperthreading.</p></div></blockquote></div><p>Similar vulnerabilities, especially from Intel, will keep coming.&#160; 2018 was the year of microcode exploits.&#160; Until Intel releases a mass-recall to fix their hardware (they won&#039;t), just sit back and enjoy the show.</p><div class="quotebox"><blockquote><div><p>Any idea pls ?</p></div></blockquote></div><p>It&#039;s good practice to find research whether or not the CVE has been resolved:<br /><a href="https://www.debian.org/security/2019/dsa-4444" rel="nofollow">https://www.debian.org/security/2019/dsa-4444</a></p>]]></description>
			<author><![CDATA[dummy@example.com (siva)]]></author>
			<pubDate>Thu, 16 May 2019 13:56:55 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=16087#p16087</guid>
		</item>
		<item>
			<title><![CDATA[ZombieLoad Attack (CVE-2018-12130), hyperthreading -how to disable it?]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=16084#p16084</link>
			<description><![CDATA[<p>There is anoher intel vulnerability which uses hyperthreading. </p><p>I&#039;ve booted ASCII kernel with <span class="bbc">noht</span> parameter.</p><p>I&#039;ve tried to disable hyperthreading:</p><div class="codebox"><pre><code>sudo -i &amp;&amp; echo 0 &gt; /sys/devices/system/cpu/online</code></pre></div><p>but </p><div class="codebox"><pre><code># cat /sys/devices/system/cpu/online 
0-3</code></pre></div><p>Any idea pls ?</p><div class="codebox"><pre><code>$ uname -a
4.9.0-9-amd64 #1 SMP Debian 4.9.168-1+deb9u2 (2019-05-13) x86_64 GNU/Linux</code></pre></div>]]></description>
			<author><![CDATA[dummy@example.com (boycottsystemd)]]></author>
			<pubDate>Thu, 16 May 2019 11:39:27 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=16084#p16084</guid>
		</item>
	</channel>
</rss>
