[elrepo] kernel-lt and kernel-ml updates for Meltdown and Spectre

Phil Perry phil at elrepo.org
Wed Jan 10 18:28:29 EST 2018


On 10/01/18 22:10, Sam McLeod wrote:
> On #Elrepo IRC at the moment, interesting to see my CPU + latest intel 
> microcode download + latest elrepo kernel-ml is significantly more 
> at-risk still:
> 

Yes, it would appear so. I'll do my best to try to explain below.

> 
> ~ [0] # uname -a
> Linux nas 4.14.12-1.el7.elrepo.x86_64 #1 SMP Fri Jan 5 13:28:56 EST 2018 
> x86_64 x86_64 x86_64 GNU/Linux
> 
> 
> ~ [0] # dmesg | grep -i micro
> [    0.000000] microcode: microcode updated early to revision 0x23, date 
> = 2017-11-20
> [    0.494508] microcode: sig=0x306c3, pf=0x2, revision=0x23
> [    0.494918] microcode: Microcode Update Driver: v2.2.
> 
> ~ [0] # ./spectre-meltdown-checker.sh
> Spectre and Meltdown mitigation detection tool v0.24
> 
> Checking for vulnerabilities against live running kernel Linux 
> 4.14.12-1.el7.elrepo.x86_64 #1 SMP Fri Jan 5 13:28:56 EST 2018 x86_64
> 
> CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
> * Checking count of LFENCE opcodes in kernel:  NO  (only 37 opcodes 
> found, should be >= 70)
>  > STATUS:  VULNERABLE  (heuristic to be improved when official patches 
> become available)
> 

Please refer to Greg K-H's blog post:

http://www.kroah.com/log/blog/2018/01/06/meltdown-status/

As described by Greg, there are currently no Spectre patches in the 
upstream kernel.org kernels, hence why kernel-lt and kernel-ml packages 
show as vulnerable for Spectre.

Red Hat have merged patches that address this issue into the distro 
kernel before they have been officially accepted/merged into the 
upstream kernel.org kernel.

> CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
> * Mitigation 1
> *   Hardware (CPU microcode) support for mitigation:  YES
> *   Kernel support for IBRS:  NO
> *   IBRS enabled for Kernel space:  NO
> *   IBRS enabled for User space:  NO
> * Mitigation 2
> *   Kernel compiled with retpoline option:  NO
> *   Kernel compiled with a retpoline-aware compiler:  NO
>  > STATUS:  VULNERABLE  (IBRS hardware + kernel support OR kernel with 
> retpoline are needed to mitigate the vulnerability)
> 

Again, Red Hat have merged IBRS patches into the distro kernel before 
they have been officially accepted/merged into the upstream kernel.org 
kernel, hence why the distro kernel shows as not vulnerable, but only 
when the CPU microcode or BIOS has also been updated (Mitigation 1).

> CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
> * Kernel supports Page Table Isolation (PTI):  YES
> * PTI enabled and active:  YES
>  > STATUS:  NOT VULNERABLE  (PTI mitigates the vulnerability)
> 
> A false sense of security is worse than no security at all, see --disclaimer
> 

Both kernel-ml/kernel-lt and the RHEL distro kernels appear fixed / not 
vulnerable to Meltdown as they were fixed in the releases made on 
4th/5th January.

At this point kernel-ml and kernel-lt packages are still vulnerable to 
Spectre whereas the latest RHEL distro kernel contains patches for Spectre.

Hope that helps clarify things as they stand right now. As soon as 
Spectre is addressed upstream in the kernel.org kernels, the fixes 
should translate through to kernel-lt and kernel-ml packages.



More information about the elrepo mailing list