-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Your system is vulnerable to Meltdown and/or Spectre attacks #212
Comments
TITLE
TL;DR FAQ Meltdown bypasses hardware security boundaries between applications and the operating systems and uses this to gain access to memory based on 'out of order' sequencing. Intel chips manufactured since 2010 were reported to be vulnerable to these issues. Spectre also acts at a hardware level by essentially 'tricking' a program into executing a sequence it wouldn't normally by exploiting the speculative logic systems in a chip. Meltdown vulnerabilities are easier to exploit than Spectre, but Spectre attacks are harder to mitigate. Software updates are being rolled out to protect against these vulnerabilities, so it is imperative that if you have affected hardware that you are up to date. While there are no actual attacks recorded to date, rather as a proof of concept, it cannot be said for certain that no attacks have taken place given that they would not be recorded. |
I think this is a CVE tho |
Also probably constitutes a whole article |
This is good @fshmcallister. I would however change the device reference as discussed, and also change |
Updated TL;DR I imagine this varies by distro though? Maybe I should rework the last part to just 'update your distribution's kernel.' |
Yes, this will be distribution specific, but let's use debian/ubuntu ones for now. |
@vpetersson There may be more than one package affected. Not only kernel, but also drivers and some software. |
@a-martynovich @vpetersson in the larger guide I am writing I suggest updating other software and drivers separately. For this FAQ though what do you think is better, just |
Is there any way for us to filter this out (within reason)? For instance, wouldn't
I was under the impression that
That said, my concern with either |
This fix will be improved in WoTTsecurity/agent#257 |
Where are we sitting on this one now? |
Yes |
TITLE
TL;DR FAQ Meltdown bypasses hardware security boundaries between applications and the operating systems and uses this to gain access to memory based on 'out of order' sequencing. Intel chips manufactured since 2010 were reported to be vulnerable to these issues. Spectre also acts at a hardware level by essentially 'tricking' a program into executing a sequence it wouldn't normally by exploiting the speculative logic systems in a chip. Meltdown vulnerabilities are easier to exploit than Spectre, but Spectre attacks are harder to mitigate. Software updates are being rolled out to protect against these vulnerabilities, so it is imperative that if you have affected hardware that you are up to date. While there are no actual attacks recorded to date, rather as a proof of concept, it cannot be said for certain that no attacks have taken place given that they would not be recorded. |
Bearing in mind this is the one that I still don't know what we're doing with because you didn't come to a conclusion |
its literally the same text, the only thing 'wrong' is the update command, and I didn't know what you opted for |
This is wrong |
TITLE TL;DR FAQ Meltdown bypasses hardware security boundaries between applications and the operating systems and uses this to gain access to memory based on 'out of order' sequencing. Intel chips manufactured since 2010 were reported to be vulnerable to these issues. Spectre also acts at a hardware level by essentially 'tricking' a program into executing a sequence it wouldn't normally by exploiting the speculative logic systems in a chip. Meltdown vulnerabilities are easier to exploit than Spectre, but Spectre attacks are harder to mitigate. Software updates are available in most operating systems to protect against these vulnerabilities, so it is imperative that if you have affected hardware that you are up to date. While there are no actual attacks recorded to date, rather as a proof of concept, it cannot be said for certain that no attacks have taken place given that they would not be recorded. Code Snippet To update your operating system, run the following commands: ``` |
but again, bear in mind this one wasn't updated because I didn't get a concrete answer re: the update command |
We detected that {devices} is vulnerable to Meltdown/Spectre. You can learn more about these issues here. To fix the issue, please run apt-get update && apt-get upgrade.
part of #198
The text was updated successfully, but these errors were encountered: