[ubuntu-hardened] 16.04 LTS (i386/x86): the lack of a kernel hardening patches and config options? (Meltdown and Spectre attacks).

daniel curtis sidetripping at gmail.com
Wed Feb 28 15:08:49 UTC 2018


Hello.

What a shame! I've wrote, that using journalctl(1) command I can check
a microcode updates etc., but I'm wrong, right? All these
kernel:microcode informations; about CPU0/1, sig and so on are not
something, that will tell me if a microcode package is installed.

I think, that if I will install an 'intel-microcode' (it's valid in my
case) the result about microcode, gathered e.g. via dmesg(1) will be
significantly different, from these mentioned in my previous message.
So, it will, probably, looks this way:

[~]$ sudo dmesg | grep microcode
[    0.000000] microcode: microcode updated early to revision 0x12,
date = 2017-11-20
[    0.000000] Intel Spectre v2 broken microcode detected; disabling
Speculation Control
[    0.326377] microcode: sig=0x00000, pf=1x2, revision=0x34
[    0.326507] microcode: Microcode Update Driver: v2.2.

Note: I've changed 'sig=' and 'revision=' values. As we can see, there
are some informations about "Spectre_V2" mitigations etc. But, it's
just an example of how everything will be looks like after
'intel-microcode' package installation. So, 'journalctl -k | grep
microcode' command result (see my previous message) is not sufficient
without 'intel-microcode' package, right?

I'm sorry for my naive and pretty stupid questions.

Thank, best regards.
_________________

By the way: where is the best place to write about an application
(available in 16.04 LTS) that is missing a few CVE security fixes:
CVE-2017-*? (Mostly, it's about Heap-based buffer overflow, Out of
bounds read, Stack-based buffer over-read etc.) I'm asking, because
this application has been updated with security patches even in 14.04
LTS, Bionic version is also corrected etc. Should it be a Maintainer
or this mailing list is okay?



More information about the ubuntu-hardened mailing list