Closed ghost closed 6 years ago
Closing as duplicate of #133, please read it, it'll answer your questions. Please repoen if this is not the case!
Thanks!
@anchev the tool only checks if mitigations are available on the system:
`CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1' ... STATUS: NOT VULNERABLE (Mitigation: __user pointer sanitization)
Unless you study the disclaimer, the above output might cloud your sense of security. Because, unless you compile the code of executables afresh and correctly, the SV1 exploits still work nicely, contrary to "STATUS: NOT VULNERABLE". If you/others have not done it, this message (mitigation in place) boils down to: "No Security at all".
@f-s You may want to take a look at this proposal by Chandler Carruth/Google for the LLVM project:
RFC: Speculative Load Hardening (a Spectre variant #1 mitigation)
This is a new proposal that comes close to (automatically) fixing occurrences of Spectre V1 problems (by recompilation) - at a high performance cost however.
@f-s which executables? I am using openSUSE Leap and I get the binaries from the official repos. I have read the disclaimer of course, that's why I asked additional questions in the linked issue which @speed47 shared.
@anchev executables which have not been recompiled with SV1 compiler mitigations active? I have no idea what openSUSE is doing. I would use LFS-like distributions to be sure, maybe Gentoo, too ;-)
@f-s I have no idea what exactly openSUSE do either but the fact is they provided patches quite quickly after the announcements. It is a well maintained distro.
In a sense perhaps you are right - LFS would be probably the cleanest and self-reliant way but I don't feel I have the knowledge to jump that deep, so I still stay with openSUSE.
In case you are interested, here is a bug report with lots of comments about Spectre and Meltdown:
https://bugzilla.suse.com/show_bug.cgi?id=1068032
Unfortunately I can't find the answer to what we discuss here in it. Are you saying that each and every program on the system needs to be recompiled with particular mitigation (of the compiler)?
Unfortunately I can't find the answer to what we discuss here in it. Are you saying that each and every program on the system needs to be recompiled with particular mitigation (of the compiler)?
@anchev every program which might use speculative execution in a security context and has not been fixed/checked/tested/debugged with regard to SV1 by the developers yet, yes I want to recompile it with compiler mitigations in place.
Thanks for this info @f-s.
Do you think it would be reasonable to file a bug report to openSUSE requesting such recompilation (they will be releasing new version of the distro soon)? Can you suggest a link with more info about such compilation or a proper way to file such a bug report? Then I can file it to them. Hopefully for the good of everyone.
Speaking of all this: how should one compile the PoC mentioned in the OP here, i.e. what compile options would make it a non-exploit?
Today I tested this Spectre PoC on my system and the exploit worked.
Meanwhile this tool shows me:
May I ask for some clarification on this matter please?