Zanimljivi klipovi, linkovi, tekstovi, slike...

Vlad

Well-known member
Joined
Feb 13, 2012
Messages
2,259
Reaction score
240
“Meltdown and Spectre” (bugs)

To nam je tako kada “(neozbiljni) ljubitelji Džems Bonda i drugih filmova i TV serija” imenuju bagove. 😉
 
Last edited:

Misko_2083

Member
Joined
Mar 15, 2015
Messages
306
Reaction score
18
alt
1443:
Check Linux for Spectre or Meltdown vulnerability - gHacks Tech News
Video sam ranije taj skript i isprobao na TRIOS-u.
Code:
Spectre and Meltdown mitigation detection tool v0.27

Checking for vulnerabilities against live running kernel Linux 3.16.0-4-amd64 #1 SMP Debian 3.16.51-3 (2017-12-13) x86_64

CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
* Checking count of LFENCE opcodes in kernel:  NO
> STATUS:  VULNERABLE  (only 23 opcodes found, should be >= 70, heuristic to be improved when official patches become available)

CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
* Mitigation 1
*  Hardware (CPU microcode) support for mitigation:  NO
*  Kernel support for IBRS:  NO
*  IBRS enabled for Kernel space:  NO
*  IBRS enabled for User space:  NO
* Mitigation 2
*  Kernel compiled with retpoline option:  NO
*  Kernel compiled with a retpoline-aware compiler:  NO
> STATUS:  VULNERABLE  (IBRS hardware + kernel support OR kernel with retpoline are needed to mitigate the vulnerability)

CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
* Kernel supports Page Table Isolation (PTI):  NO
* PTI enabled and active:  NO
> STATUS:  VULNERABLE  (PTI is needed to mitigate the vulnerability)

A false sense of security is worse than no security at all, see --disclaimer
 
Last edited:

Dragan

Well-known member
Staff member
Joined
Jan 13, 2012
Messages
6,371
Reaction score
65
TRIOS koristi standardni debian kernel…usput, malo je drugačiji rezultat za AMD procesor:
 
Last edited:
Joined
Oct 16, 2015
Messages
331
Reaction score
3

Колко сам схватио, ово је виртуални оперативни систем који се инсталира преко Виндовса, дакле дође као нека тема, да Виндовс више сличи Линуксу. Немам Виндовс на овом лаптопу па нисам пробао али кад одем кући, пробаћу. Нема неку конкретну намену осим да улепша Виндовс, а разлог зашто сам поделио клип са вама је тај што ми се изглед ове, ако могу да кажем, теме невероватно допао, па сад, ако већ морам да имам Виндовс да рачунару, онда нека изгледа овако, а не онако како изгледа 🙂
 
Last edited:

Misko_2083

Member
Joined
Mar 15, 2015
Messages
306
Reaction score
18
TRIOS koristi standardni debian kernel…usput, malo je drugačiji rezultat za AMD procesor:
Isprobao i 4.14.13 na triosu
Code:
Spectre and Meltdown mitigation detection tool v0.27

Checking for vulnerabilities against live running kernel Linux 4.14.13 #1 SMP Mon Jan 15 15:01:54 CET 2018 x86_64

CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
* Checking count of LFENCE opcodes in kernel:  NO
> STATUS:  VULNERABLE  (only 22 opcodes found, should be >= 70, heuristic to be improved when official patches become available)

CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
* Mitigation 1
*  Hardware (CPU microcode) support for mitigation:  NO
*  Kernel support for IBRS:  NO
*  IBRS enabled for Kernel space:  NO
*  IBRS enabled for User space:  NO
* Mitigation 2
*  Kernel compiled with retpoline option:  NO
*  Kernel compiled with a retpoline-aware compiler:  NO
> STATUS:  VULNERABLE  (IBRS hardware + kernel support OR kernel with retpoline are needed to mitigate the vulnerability)

CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
* Kernel supports Page Table Isolation (PTI):  YES
* PTI enabled and active:  YES
> STATUS:  NOT VULNERABLE  (PTI mitigates the vulnerability)

A false sense of security is worse than no security at all, see --disclaimer
Radi brže na mojoj mašini (FireFox leti) i nema Meltdown-a. 🙂
 
Last edited:

Dragan

Well-known member
Staff member
Joined
Jan 13, 2012
Messages
6,371
Reaction score
65
alt
Misko_2083:
Radi brže na mojoj mašini (FireFox leti) i nema Meltdown-a. 🙂
Ovo nisam baš razumeo…šta radi bolje i brže? TRIOS sa novijim kernelom u odnosu na stari, ili…?
Koje su specifikacije mašine?
 
Last edited:

Ladislav

Member
Joined
Jun 30, 2015
Messages
415
Reaction score
0
izvinjavam se što upadam…
TRIOS koristi standardni debian kernel…usput, malo je drugačiji rezultat za AMD procesor:
…jel treba da sam zabrinut, ne razumem se, moji rezultati su malo drugačiji Debian-Stretch?

Code:
root@deb-pc:/home/fish105/Downloads/spectre-meltdown-checker-master# inxi -Cxxx
CPU: Quad core Intel Core2 Quad Q6600 (-MCP-) cache: 4096 KB
flags: (lm nx sse sse2 sse3 ssse3 vmx) bmips: 19243
clock speeds: min/max: 1596/2394 MHz 1: 1596 MHz 2: 1596 MHz
3: 1596 MHz 4: 1596 MHz
root@deb-pc:/home/fish105/Downloads/spectre-meltdown-checker-master# ./spectre-meltdown-checker.sh
Spectre and Meltdown mitigation detection tool v0.31

Checking for vulnerabilities against running kernel Linux 4.9.0-5-amd64 #1 SMP Debian 4.9.65-3+deb9u2 (2018-01-04) x86_64
CPU is Intel(R) Core™2 Quad CPU Q6600 @ 2.40GHz

CVE-2017-5753 [bounds check bypass] aka ‘Spectre Variant 1’
[LIST]
[*]Checking count of LFENCE opcodes in kernel: NO
[/LIST]
[QUOTE]
STATUS: VULNERABLE (only 25 opcodes found, should be >= 70, heuristic to be improved when official patches become available)
[/QUOTE]
CVE-2017-5715 [branch target injection] aka ‘Spectre Variant 2’
[LIST]
[*]Mitigation 1
[*]Hardware (CPU microcode) support for mitigation
[*][CODE]The SPEC_CTRL MSR is available:  NO
[*]
Code:
The SPEC_CTRL CPUID feature bit is set:  NO
[*]Kernel support for IBRS: NO
[*]IBRS enabled for Kernel space: NO
[*]IBRS enabled for User space: NO
[*]Mitigation 2
[*]Kernel compiled with retpoline option: NO
[*]Kernel compiled with a retpoline-aware compiler: NO
[/LIST]
STATUS: VULNERABLE (IBRS hardware + kernel support OR kernel with retpoline are needed to mitigate the vulnerability)
CVE-2017-5754 [rogue data cache load] aka ‘Meltdown’ aka ‘Variant 3’
  • Kernel supports Page Table Isolation (PTI): YES
  • PTI enabled and active: YES
  • Checking if we’re running under Xen PV (64 bits): NO
STATUS: NOT VULNERABLE (PTI mitigates the vulnerability)
A false sense of security is worse than no security at all, see --disclaimer
root@deb-pc:/home/fish105/Downloads/spectre-meltdown-checker-master#
[/CODE]

… a ovo je izveštaj od TRIOS:

View attachment 4860
 
Last edited:

Commander

Well-known member
Staff member
Joined
Jan 13, 2012
Messages
9,235
Reaction score
530
Nema oko čega da brineš, pre će te ajkula ujestu za nogu nego što će te neko hakovati na ovaj sigurnosni propust 😉
 
Last edited:

Commander

Well-known member
Staff member
Joined
Jan 13, 2012
Messages
9,235
Reaction score
530
Imamo mi jednog ovde na forumu dragog člana što nam pravi pozadine za Trios… po završnom radu bi se reklo da je upoiznat sa halucinogenim sredstvima za rad 😃
 
Last edited:

Misko_2083

Member
Joined
Mar 15, 2015
Messages
306
Reaction score
18
How to Hack a Turned-off Computer, or Running Unsigned Code in Intel ME
 
Last edited:
Top