[Bug 1163120] No mitigations for CPU vulnerabilities
http://bugzilla.suse.com/show_bug.cgi?id=1163120 http://bugzilla.suse.com/show_bug.cgi?id=1163120#c9 --- Comment #9 from Borislav Petkov <bpetkov@suse.com> ---
- Why are L1TF and Meltdown not mitigated in kernel-default but only in kernel-pae?
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?i...
- Is it possible to mitigate MDS and 'Spec store bypass' through kernel or only through microcode?
As previously stated, only through microcode update.
- Can L1TF, MDS or 'Spec store bypass' be exploited through web JavaScript, like shown in the video/papers?
L1TF: https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html#mitigat... MDS: https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html#attack-s... SSB: https://software.intel.com/security-software-guidance/software-guidance/spec...
The section "Process Isolation" here https://software.intel.com/security-software-guidance/software-guidance/spec... kinda explains what you need to do. The section "Web-Browsers" here https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html#attack-s... says that MDS exploitation through JS is highly-unlikely. The section "Mitigation selection guide" here https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html#mitigat... says that if you don't use virtualization, the system is protected, as I already pointed out previously. And that's all the answers I can give you: I cannot tell you just by describing what you do whether what you do is absolutely secure. Maybe, maybe not. I also cannot tell you how likely is a "highly-unlikely" exploitation. I don't think anyone would give you guarantees here. What I can tell you is that we do our best to have the kernel up-to-date and contain the latest mitigations. I sincerely hope that helps. -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@novell.com