Re: intel-microcode not fixing CVE-2018-3640, CVE-2018-3615 on Debian 10?

2021-01-14 Thread Christoph Pflügler



On 13.01.21 23:49, Michael Stone wrote:

On Wed, Jan 13, 2021 at 09:49:43PM +0100, Christoph Pflügler wrote:
[    0.00] microcode: microcode updated early to revision 0xd6, 
date = 2019-10-03

[    0.379026] SRBDS: Vulnerable: No microcode
[    1.625090] microcode: sig=0x506e3, pf=0x2, revision=0xd6
[    1.625215] microcode: Microcode Update Driver: v2.2.

Seems like the microcode is applied to my CPUs. This is also 
supported by numerous other CVEs getting mitigated after 
intel-microcode installation.


That's exactly the same signature I was testing with different results:
microcode: sig=0x506e3, pf=0x2, revision=0xd6

The only way I can get your results is to run unprivileged, but you 
said you weren't doing that. The checks for 3640 and 3615 are 
basically just looking for SSBD; in the top section the line that says 
"CPU indicates SSBD capability" presumably says something other than 
"YES (Intel SSBD)"?
I also tried the latest meltdown-spectre-checker (v0.44), the results 
are the same (plus another red 2020 CVE).


This is presumably CVE-2020-0543; if you look at the changelog for 
intel-microcode it discusses that issue. You can install the backports 
version which should fix that at the risk of a boot failure.


You are absolutely right, the SSBD lines say the following (when 
executed as root):


  * Speculative Store Bypass Disable (SSBD)
    * CPU indicates SSBD capability:  UNKNOWN  (is cpuid kernel module 
available?)





Re: intel-microcode not fixing CVE-2018-3640, CVE-2018-3615 on Debian 10?

2021-01-13 Thread Christoph Pflügler



On 13.01.21 17:15, Michael Stone wrote:

On Tue, Jan 12, 2021 at 05:25:23PM +0100, Giacomo Catenazzi wrote:

In any case, according Intel, microcode should be updated by BIOS


I wonder if anyone from intel can manage to say that with a straight 
face.



This is the dmesg | grep microcode output for the i5 gen3:

[    0.00] microcode: microcode updated early to revision 0x21, date 
= 2019-02-13

[    0.222193] SRBDS: Vulnerable: No microcode
[    1.067686] microcode: sig=0x306a9, pf=0x10, revision=0x21
[    1.067856] microcode: Microcode Update Driver: v2.2.

and here the one for the E3 v5:

[    0.00] microcode: microcode updated early to revision 0xd6, date 
= 2019-10-03

[    0.379026] SRBDS: Vulnerable: No microcode
[    1.625090] microcode: sig=0x506e3, pf=0x2, revision=0xd6
[    1.625215] microcode: Microcode Update Driver: v2.2.

Seems like the microcode is applied to my CPUs. This is also supported 
by numerous other CVEs getting mitigated after intel-microcode 
installation.


I also tried the latest meltdown-spectre-checker (v0.44), the results 
are the same (plus another red 2020 CVE).





Re: intel-microcode not fixing CVE-2018-3640, CVE-2018-3615 on Debian 10?

2021-01-09 Thread Christoph Pflügler



On 08.01.21 23:40, Michael Stone wrote:

On Fri, Jan 08, 2021 at 10:48:30PM +0100, Christoph Pflügler wrote:

On 08.01.21 22:34, Michael Stone wrote:

On Fri, Jan 08, 2021 at 09:12:53PM +0100, Christoph Pflügler wrote:
Installing package intel-microcode in Debian 10 (Buster) mitigates 
most vulnerabilities as per spectre-meltdown-checker. However, 
CVE-2018-3640 and CVE-2018-3615 are still displayed as unmitigated 
after reboot, with spectre-meltdown-checker --explain (executed as 
su) pointing to missing microcode upgrades.


According to the Debian package description of intel-microcode, the 
two vulnerabilities are fixed in the current version of the package.


This occurs in exactly the same way on two different machines, one 
with an i5-3320M CPU and another one with an E3-1235L v5.


If I remember correctly, I was all green as per 
spectre-meltdown-checker in Debian 9 (Stretch).


What version of intel-microcode do you have installed?
intel-microcode:amd64/buster 3.20200616.1~deb10u1 uptodate, installed 
from Debian non-free repository


With an E3 v5, linux 4.19.0-13, and intel-microcode 3.20200616.1 the 
checker reports green for those checks on my test system. Do you have 
the latest spectre-meltdown-checker, and are you running it as root? 
If I run the current version as an unprivileged user those checks come 
up red (presumably because it can't read the cpu registers it is 
trying to read).


spectre-meltdown-checker:all/buster 0.42-1 uptodate, installed from 
Debian repository.


Yes, I executed it as root (su ->  -> spectre-meltdown-checker). 
I get exactly the same results running it as an unprivileged user. This 
is what spectre-meltdown-checker, run as root, shows for the two CVEs:


CVE-2018-3615 aka 'Foreshadow (SGX), L1 terminal fault'
* CPU microcode mitigates the vulnerability:  N/A
> STATUS:  VULNERABLE  (your CPU supports SGX and the microcode is not 
up to date)


CVE-2018-3640 aka 'Variant 3a, rogue system register read'
* CPU microcode mitigates the vulnerability:  NO
> STATUS:  VULNERABLE  (an up-to-date CPU microcode is needed to 
mitigate this vulnerability)


Linux version is also 4.19.0-13-amd64.

Both my instances are (almost) fresh installations (GNOME) based on 
recently released debian-10.7.0-amd64-netinst.iso.





Re: intel-microcode not fixing CVE-2018-3640, CVE-2018-3615 on Debian 10?

2021-01-08 Thread Christoph Pflügler



On 08.01.21 22:34, Michael Stone wrote:

On Fri, Jan 08, 2021 at 09:12:53PM +0100, Christoph Pflügler wrote:
Installing package intel-microcode in Debian 10 (Buster) mitigates 
most vulnerabilities as per spectre-meltdown-checker. However, 
CVE-2018-3640 and CVE-2018-3615 are still displayed as unmitigated 
after reboot, with spectre-meltdown-checker --explain (executed as 
su) pointing to missing microcode upgrades.


According to the Debian package description of intel-microcode, the 
two vulnerabilities are fixed in the current version of the package.


This occurs in exactly the same way on two different machines, one 
with an i5-3320M CPU and another one with an E3-1235L v5.


If I remember correctly, I was all green as per 
spectre-meltdown-checker in Debian 9 (Stretch).


What version of intel-microcode do you have installed?
intel-microcode:amd64/buster 3.20200616.1~deb10u1 uptodate, installed 
from Debian non-free repository




intel-microcode not fixing CVE-2018-3640, CVE-2018-3615 on Debian 10?

2021-01-08 Thread Christoph Pflügler
Installing package intel-microcode in Debian 10 (Buster) mitigates most 
vulnerabilities as per spectre-meltdown-checker. However, CVE-2018-3640 
and CVE-2018-3615 are still displayed as unmitigated after reboot, with 
spectre-meltdown-checker --explain (executed as su) pointing to missing 
microcode upgrades.


According to the Debian package description of intel-microcode, the two 
vulnerabilities are fixed in the current version of the package.


This occurs in exactly the same way on two different machines, one with 
an i5-3320M CPU and another one with an E3-1235L v5.


If I remember correctly, I was all green as per spectre-meltdown-checker 
in Debian 9 (Stretch).


Does anybody have an explanation and/or fix for this issue?


Thanks and best regards,

Christoph