-
Notifications
You must be signed in to change notification settings - Fork 685
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Test failure on 4.14.154-grsec-securedrop using NUC7i7DNHE #5040
Comments
I repro'd, seeing 2 vulnerabilities:
|
(@creviera just mentioned that, as in my case, installing |
Thanks @rocodes for all your help in debugging this issue and @creviera for reproducing. After some investigation, we've come to the following conclusion: because the test is passing on a vanilla kernel, and that the mitigation is only microcode, and that we use the exact same microcode (both bios and deb package), this failure is a very likely a false positive, as the script cannot detect that we have the CPU features introduced for other L1TF mitigations (CVE-2018-3620) due to the grsecurity mitigations in place. The reason we have not seen this before is that not many of us have modern i7 CPUs for testing which is why we haven't seen it before. The test for CVE-2018-3615 is somewhat unreliable, as described in the comments (https://github.com/speed47/spectre-meltdown-checker/blob/6e799e8b013c6543c5d1fef3f7d69ce172a9ff52/spectre-meltdown-checker.sh#L4359-L4367). The primary detection method for detection is accessing MSR get information about presence of the flush command. However this is blocked on our grsecurity kernel due to It's unclear why they don't use the full CVE-2018-3620 test as part of the CVE-2018-3613, likely to keep it self-contained. The former uses the more reliable (at least under grsecurity) method of reading Furthermore, testing on VMs ( with the 4.14.154 kernel, though with CPU marked not vulnerable), i can reproduce the l1 flush check failing (failing as in returning an inconclusive result blue text Given that the test passed in the vanilla kernel, that we are using the exact same microcode package, and that |
This is what I see in VMs also. Also the theory about MSR makes sense, I see this when I'm running the spectre-meltdown-checker.sh script in a SD VM:
It looks like this denial isn't handled by the script to set Regarding
|
Description
Running Meltdown tests (https://meltdown.ovh/) on NUC7i7DNHE with 4.14.154-grsec-securedrop kernel leads to a failure for CVE-2018-3615 (Foreshadow SGX).
This has been tested on BIOS version 0066 and 0067 (most recent).
Steps to Reproduce
Run meltdown test script at https://meltdown.ovh/ as sudo on NUC7i7DHNE. Note: only try this on non production (QA) machines!
Expected Behavior
No failures
Actual Behavior
2 vulnerabilities: One with Spectre v2 (CVE-2017-5715), which can be remediated by installing
binutils
(remediation approved by @emkll).The second:
Comments
Needs reproducing
The text was updated successfully, but these errors were encountered: