Gentoo Archives: gentoo-user

From: mad.scientist.at.large@××××××××.com
To: gentoo-user@l.g.o
Subject: Re: [gentoo-user] microcode applied?
Date: Mon, 08 Jan 2018 04:42:28
Message-Id: L2J3sag--3-0@tutanota.com
In Reply to: Re: [gentoo-user] microcode applied? by "Max Zettlmeißl"
1 There is also a test program to see if the vulnerability is there, i'd definately check that as well, best to check both considering how terrible the but is.  frankly amd and intel will still have software vulnerabilities, particular apps are being patched but if an exploit is developed in the "wild" or the info leaks it will be used with other vulnerabilities, with user privilages i believe or does it require root/susceptable root code. 
2
3 Frankly, i suspect with more research, or possibly unreleased details that you could likely use the larger issues in other bad ways, hopefully not easily (there will always be other easier exploits, this one just makes everything else easy if you know it, most people take the easy way whether breaking in or doing anything else).  You really can't fix it completely in software on either brand, at best you are counting on code to protect code from a hardware on intel, and  more mild but still dangerous design issues on both.  hopefully microcode update will help, hopefully it doesn't disable features that are hard to live without.
4
5 Hopefully things will get better, and hopefully new features on new chips will help or prevent this issue after the OS is rewritten to use them and if you can block code that doesn't work with new features, i.e. no backwards compatibility.  modern cpu design has many potential security issues and chips that use things like parallel execution have to be  very carefully designed to hopefully avoid such issues, obviously hardware at this complexity is as impossible to fully test and debug as any large modern piece of software.  Many hacks result from thinking about things sideways or in ways no one on the engineering team has, no one sees and knows it all, there are simply too many possibilities to test completely.  You have to depend on trying not to get weakness in and on protecting from the unseen by keeping everything else secure so that hopefully one good thing will block the exploitation of a flaw.  Security in Depth is your' best option, absolute security is unlikely even on quantum computers, and impossible on anything less of any complexity with features modern computing depends on.
6
7
8 mad.scientist.at.large (a good madscientist)
9 --
10 God bless the rich, the greedy and the corrupt politicians they have put into office.   God bless them for helping me do the right thing by giving the rich my little pile of cash.  After all, the rich know what to do with money.
11
12
13 7. Jan 2018 21:01 by max@×××××××××××.de:
14
15
16 >> Does the absence of a "microcode updated" message in dmesg imply that the
17 >> microcode was not updated?
18 >
19 > Not necessarily.
20 >
21 >> Is there a way to turn on debugging?
22 >
23 > The easiest way to check whether the microcode update was applied
24 > correctly would be to check the microcode version in /proc/cpuinfo

Replies

Subject Author
Re: [gentoo-user] microcode applied? Rich Freeman <rich0@g.o>