Zombieload

For interesting topics. But remember this is a Linux Forum. Do not post offensive topics that are meant to cause trouble with other members or are derogatory towards people of different genders, race, color, minors (this includes nudity and sex), politics or religion. Let's try to keep peace among the community and for visitors.

No spam on this or any other forums please! If you post advertisements on these forums, your account may be deleted.

Do not copy and paste entire or even up to half of someone else's words or articles into posts. Post only a few sentences or a paragraph and make sure to include a link back to original words or article. Otherwise it's copyright infringement.

You can talk about other distros here, but no MX bashing. You can email the developers of MX if you just want to say you dislike or hate MX.
Message
Author
User avatar
KBD
Posts: 959
Joined: Sun Jul 03, 2011 7:52 pm

Re: Zombieload

#11 Post by KBD »

JayM wrote: Wed May 15, 2019 8:53 pm Likewise. I plan to continue buying used or surplus computers rather than brand-new ones, should I buy another, and look for AMD CPUs in them. Not only are old surplus machines less expensive, buying those is also the green thing to do, reusing them instead of throwing them in a landfill, plus any issues with their CPUs and firmware has been fixed for a long time already. I don't play games as I find them boring after an hour or so, so I have no need of the latest, greatest, fastest, bestest computer. Old is fine, just as long as it doesn't break down on me and stop working.
If this keeps up, we are all going to have to buy or dig out single core CPU machines for online use when we are buying, banking, pretty much anything online. And those machines will be as fast as dual-core intel CPU's by the time we get to the end of all these migrations.

mx-2018
Posts: 23
Joined: Wed Oct 31, 2018 11:42 am

Re: Zombieload

#12 Post by mx-2018 »

I think sellers of used laptops at Amazon are well aware of this, because the 2010 hp laptops suddenly are more expensive than the 2012 hp laptops.
MX-18_x64 Continuum March 14 2018
Intel Core2 Quad Q9400
Intel 4 Series Integrated Graphics

User avatar
sunrat
Posts: 636
Joined: Mon Mar 28, 2016 9:54 pm

Re: Zombieload

#13 Post by sunrat »

JayM wrote: Wed May 15, 2019 8:53 pmNot only are old surplus machines less expensive, buying those is also the green thing to do, reusing them instead of throwing them in a landfill,...
True you're saving them from landfill but old computers use vastly greater amounts of electricity than new ones to do the same work.
Says sunrat typing on his 11 year old Core2Duo system. ;)

User avatar
timkb4cq
Developer
Posts: 3186
Joined: Wed Jul 12, 2006 4:05 pm

Re: Zombieload

#14 Post by timkb4cq »

Stevo wrote: Wed May 15, 2019 7:15 pm The new spectre-meltdown-checker 0.41 I just packaged and sent up scans for these and reported my system OK after rebooting with the new microcode.
They still need to tweak the spectre-meltdown-checker.
It shows my AMD FX6300 system to be vulnerable to Zombieload, Fallout and the two RIDL vulnerablilities.
AMD announced that their processors are not vulnerable to any of those.
https://www.guru3d.com/news-story/amd-s ... ttack.html
HP Pavillion TP01, AMD Ryzen 3 5300G (quad core), Crucial 500GB SSD, Toshiba 6TB 7200rpm
Dell Inspiron 15, AMD Ryzen 7 2700u (quad core). Sabrent 500GB nvme, Seagate 1TB

User avatar
Head_on_a_Stick
Posts: 919
Joined: Sun Mar 17, 2019 3:37 pm

Re: Zombieload

#15 Post by Head_on_a_Stick »

timkb4cq wrote: Thu May 16, 2019 1:16 pm They still need to tweak the spectre-meltdown-checker.
It shows my AMD FX6300 system to be vulnerable to Zombieload, Fallout and the two RIDL vulnerablilities.
The upstream script was corrected 12 hours ago:

https://github.com/speed47/spectre-melt ... 360e3e54fa

I've just ran that version on my new Ryzen laptop and it reports "not vulnerable" for the new holes.

You can also use this to check:

Code: Select all

grep -R . /sys/devices/system/cpu/vulnerabilities/
No scripts needed :happy:
mod note: Signature removed, please read the forum rules

User avatar
beardedragon
Posts: 114
Joined: Wed Mar 27, 2019 11:26 pm

Re: Zombieload

#16 Post by beardedragon »

Bump:
bob@MX:~
$ grep -R . /sys/devices/system/cpu/vulnerabilities/
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
Rule #1 Backup Everything
Rule #2 Read Rule #1

User avatar
Head_on_a_Stick
Posts: 919
Joined: Sun Mar 17, 2019 3:37 pm

Re: Zombieload

#17 Post by Head_on_a_Stick »

To clarify:
beardedragon wrote: Thu May 16, 2019 5:49 pm

Code: Select all

/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
^ The MDS line refers to the new vulnerabilities.
mod note: Signature removed, please read the forum rules

User avatar
beardedragon
Posts: 114
Joined: Wed Mar 27, 2019 11:26 pm

Re: Zombieload

#18 Post by beardedragon »

Head_on_a_Stick wrote: Thu May 16, 2019 6:08 pm To clarify:
beardedragon wrote: Thu May 16, 2019 5:49 pm

Code: Select all

/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
^ The MDS line refers to the new vulnerabilities.
Some how I thought most of these problems went with AMD, not so?

Code: Select all

$ inxi -Fxzc0
System:    Host: MX Kernel: 5.0.0-16.1-liquorix-amd64 x86_64 bits: 64 compiler: gcc v: 6.3.0 
           Desktop: Xfce 4.12.3 Distro: MX-18.2_x64 Continuum Apr 7  2019 
           base: Debian GNU/Linux 9 (stretch) 
Machine:   Type: Desktop System: LENOVO product: 10181 v: Lenovo K450e serial: <filter> 
           Mobo: LENOVO model: N/A v: 31900058 STD serial: <filter> BIOS: LENOVO v: I1KT38AUS 
           date: 06/10/2014 
Battery:   Device-1: hidpp_battery_0 model: Logitech M570 charge: 90% status: Discharging 
CPU:       Topology: Quad Core model: Intel Core i5-4460 bits: 64 type: MCP arch: Haswell rev: 3 
           L2 cache: 6144 KiB 
           flags: lm nx pae sse sse2 sse3 sse4_1 sse4_2 ssse3 vmx bogomips: 25540 
           Speed: 798 MHz min/max: 800/3400 MHz Core speeds (MHz): 1: 798 2: 798 3: 798 4: 798 
Graphics:  Device-1: NVIDIA GK208 [GeForce GT 720] vendor: Micro-Star MSI driver: nvidia 
           v: 430.14 bus ID: 01:00.0 
           Display: x11 server: X.Org 1.19.2 driver: nvidia resolution: 1920x1080~60Hz 
           OpenGL: renderer: GeForce GT 720/PCIe/SSE2 v: 4.6.0 NVIDIA 430.14 direct render: Yes 
Audio:     Device-1: Intel 8 Series/C220 Series High Definition Audio vendor: Lenovo 
           driver: snd_hda_intel v: kernel bus ID: 00:1b.0 
           Device-2: NVIDIA GK208 HDMI/DP Audio vendor: Micro-Star MSI driver: snd_hda_intel 
           v: kernel bus ID: 01:00.1 
           Sound Server: ALSA v: k5.0.0-16.1-liquorix-amd64 
Network:   Device-1: Realtek RTL8111/8168/8411 PCI Express Gigabit Ethernet vendor: Lenovo 
           driver: r8169 v: kernel port: d000 bus ID: 03:00.0 
           IF: eth0 state: up speed: 1000 Mbps duplex: full mac: <filter> 
Drives:    Local Storage: total: 1.82 TiB used: 26.61 GiB (1.4%) 
           ID-1: /dev/sda vendor: Western Digital model: WD10EZEX-08M2NA0 size: 931.51 GiB 
           ID-2: /dev/sdd type: USB vendor: Western Digital model: WD Elements 25A2 
           size: 931.48 GiB 
Partition: ID-1: / size: 913.89 GiB used: 26.61 GiB (2.9%) fs: ext4 dev: /dev/sda1 
           ID-2: swap-1 size: 2.00 GiB used: 0 KiB (0.0%) fs: swap dev: /dev/sda2 
Sensors:   System Temperatures: cpu: 44.0 C mobo: N/A gpu: nvidia temp: 51 C 
           Fan Speeds (RPM): N/A gpu: nvidia fan: 28% 
Info:      Processes: 236 Uptime: 2h 19m Memory: 7.72 GiB used: 780.7 MiB (9.9%) Init: SysVinit 
           runlevel: 5 Compilers: gcc: 6.3.0 Shell: bash v: 4.4.12 inxi: 3.0.33 
Rule #1 Backup Everything
Rule #2 Read Rule #1

User avatar
Stevo
Developer
Posts: 12776
Joined: Fri Dec 15, 2006 8:07 pm

Re: Zombieload

#19 Post by Stevo »

beardedragon wrote: Thu May 16, 2019 5:49 pm Bump:
bob@MX:~
$ grep -R . /sys/devices/system/cpu/vulnerabilities/
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/mds:Mitigation: Clear CPU buffers; SMT disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
The older kernels don't know anything about the new possible exploits, so can't report that they are mitigated. :frown: So your kernel version is critical.

I have new packages of the checker, though: https://drive.google.com/open?id=1LWm3S ... JxftAR--YK_

User avatar
richb
Administrator
Posts: 10323
Joined: Wed Jul 12, 2006 2:17 pm

Re: Zombieload

#20 Post by richb »

I have new packages of the checker, though: https://drive.google.com/open?id=1LWm3S ... JxftAR--YK_
Gives a 404 error. URL not found. It is a truncated url.
Forum Rules
Guide - How to Ask for Help

richb Administrator
System: MX 23 KDE
AMD A8 7600 FM2+ CPU R7 Graphics, 16 GIG Mem. Three Samsung EVO SSD's 250 GB

Post Reply

Return to “General”