Zombieload security patched kernels

Message
Author
User avatar
anticapitalista
Developer
Posts: 4165
Joined: Sat Jul 15, 2006 10:40 am

Zombieload security patched kernels

#1 Post by anticapitalista »

Latest kernels available in the repos for 32 and 64 bit architecture (stretch, buster, testing and sid).

4.9.176 non-pae, pae and x64
4.19.43 non-pae, pae and x64
5.1.2 non-pae, pae and x64

Users are strongly advised to upgrade.
anticapitalista
Reg. linux user #395339.

Philosophers have interpreted the world in many ways; the point is to change it.

antiX with runit - lean and mean.
https://antixlinux.com

User avatar
namida12
Posts: 437
Joined: Sun Apr 01, 2007 4:54 pm

Re: Zombieload security patched kernels

#2 Post by namida12 »

Since I believe this is a Intel chip problem, is it needed in an AMD system?

User avatar
dolphin_oracle
Developer
Posts: 20001
Joined: Sun Dec 16, 2007 1:17 pm

Re: Zombieload security patched kernels

#3 Post by dolphin_oracle »

namida12 wrote: Sun May 26, 2019 10:43 pm Since I believe this is a Intel chip problem, is it needed in an AMD system?
my understanding is no
http://www.youtube.com/runwiththedolphin
lenovo ThinkPad X1 Extreme Gen 4 - MX-23
FYI: mx "test" repo is not the same thing as debian testing repo.

User avatar
namida12
Posts: 437
Joined: Sun Apr 01, 2007 4:54 pm

Re: Zombieload security patched kernels

#4 Post by namida12 »

dolphin_oracle,

From what I have read, this mediation of the Zombieload problem can be a performance hit on some functions in a Mac operating system performance, and 20-30% in MS windows. I have not seen the performance hit # for Linux, but there must be some o/s slowdown to fix this hardware problem for Intel Processors.

Understand the latest Intel CPUs are not effected by Zombieload (Gen 8 and 9)
https://www.howtogeek.com/415018/only-n ... d-spectre/

JR

User avatar
dolphin_oracle
Developer
Posts: 20001
Joined: Sun Dec 16, 2007 1:17 pm

Re: Zombieload security patched kernels

#5 Post by dolphin_oracle »

namida12 wrote: Mon May 27, 2019 10:40 am dolphin_oracle,

From what I have read, this mediation of the Zombieload problem can be a performance hit on some functions in a Mac operating system performance, and 20-30% in MS windows. I have not seen the performance hit # for Linux, but there must be some o/s slowdown to fix this hardware problem for Intel Processors.

Understand the latest Intel CPUs are not effected by Zombieload (Gen 8 and 9)
https://www.howtogeek.com/415018/only-n ... d-spectre/

JR
neither are the original generations of the core architecture. anything before sandy bridge should be ok if I'm reading things correctly.
http://www.youtube.com/runwiththedolphin
lenovo ThinkPad X1 Extreme Gen 4 - MX-23
FYI: mx "test" repo is not the same thing as debian testing repo.

User avatar
namida12
Posts: 437
Joined: Sun Apr 01, 2007 4:54 pm

Re: Zombieload security patched kernels

#6 Post by namida12 »

However a great number of Intel users are not using the latest generation of processors and I believe anticapitalista suggestions are correct, until user upgrade their hardware/computer.

Living in Vegas, I would bet there are other hardware exploitable flaws that are known at the highest levels that have still not been published/disclosed to the general computer users.

JR
Last edited by namida12 on Thu May 30, 2019 4:31 pm, edited 1 time in total.

User avatar
Head_on_a_Stick
Posts: 919
Joined: Sun Mar 17, 2019 3:37 pm

Re: Zombieload security patched kernels

#7 Post by Head_on_a_Stick »

namida12 wrote: Sun May 26, 2019 10:43 pm Since I believe this is a Intel chip problem, is it needed in an AMD system?
Not according to the kernel developers.

From my AMD laptop:

Code: Select all

E485:~$ cat /sys/devices/system/cpu/vulnerabilities/mds
Not affected
E485:~$
:happy:
mod note: Signature removed, please read the forum rules

User avatar
namida12
Posts: 437
Joined: Sun Apr 01, 2007 4:54 pm

Re: Zombieload security patched kernels

#8 Post by namida12 »

Head_on_a_Stick wrote: Mon May 27, 2019 11:20 am
namida12 wrote: Sun May 26, 2019 10:43 pm Since I believe this is a Intel chip problem, is it needed in an AMD system?
Not according to the kernel developers.

From my AMD laptop:

Code: Select all

E485:~$ cat /sys/devices/system/cpu/vulnerabilities/mds
Not affected
E485:~$
:happy:
From my AMD Ryzen 5 1500x

Code: Select all

green257@antix2:
$ cat /sys/devices/system/cpu/vulnerabilities/mds
cat: /sys/devices/system/cpu/vulnerabilities/mds: No such file or directory
green257@antix2:
$ ~$ cat /sys/devices/system/cpu/vulnerabilities/mds
bash: ~$: command not found
JR

User avatar
mmikeinsantarosa
Developer
Posts: 2199
Joined: Thu May 01, 2014 10:12 am

Re: Zombieload security patched kernels

#9 Post by mmikeinsantarosa »

I put the 5.1.2 on and if my mobile broadband continues to function will stay with it.
System: Host: mx17mainlt Kernel: 5.1.2-antix.1-amd64-smp x86_64 bits: 64 Desktop: Xfce 4.12.3
Distro: MX-18.3_x64 Continuum March 14 2018
- mike
LT: MX19.1 Quad Core model: Intel Core i7-6820HQ Kernel: 5.0.0-7.1-liquorix-amd64 x86_64

User avatar
anticapitalista
Developer
Posts: 4165
Joined: Sat Jul 15, 2006 10:40 am

Re: Zombieload security patched kernels

#10 Post by anticapitalista »

mmikeinsantarosa wrote: Wed May 29, 2019 9:46 pm I put the 5.1.2 on and if my mobile broadband continues to function will stay with it.
System: Host: mx17mainlt Kernel: 5.1.2-antix.1-amd64-smp x86_64 bits: 64 Desktop: Xfce 4.12.3
Distro: MX-18.3_x64 Continuum March 14 2018
- mike
5.1.5 is now in the repos.

https://www.antixforum.com/5-1-5-kernel-available/
anticapitalista
Reg. linux user #395339.

Philosophers have interpreted the world in many ways; the point is to change it.

antiX with runit - lean and mean.
https://antixlinux.com

Post Reply

Return to “antiX”