Collapse

Announcement

Collapse
No announcement yet.

Vulnerabilities - Meltdown and Spectre

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Vulnerabilities - Meltdown and Spectre

    Hi,

    A serious vulnerbaility has bee detected named as meltdown and spectre. Details on how to verify and patch it are as follows:


    Meltdown CPU Vulnerability CVE-2017-5754:
    A very serious and critical security problem have been discovered in the Intel/AMD/ARM CPUs. Meltdown vulnerability allows hacker to break the isolation between operating system and the user applications. This attack will allow a program to access the memory of other programs and the operating system (secrets).

    Spectre CPU Vulnerability CVE-2017-5753 and CVE-2017-5715:
    Spectre CPU Vulnerability breaks the isolation between various applications. It allows an attacker to trick error-free programs, which follow best practices, into leaking their secrets. In fact, the safety checks of said best practices actually increase the attack surface and may make applications more susceptible to Spectre.


    Patches available on Linux:
    1. Meltdown CPU Vulnerability: CVE-2017-5754
    1. Spectre Vulnerability: CVE-2017-5753 and d

    How to patch these vulnerabilities:


    1. Check the kernel
    [root@24x7 ~]# uname -r
    <version>

    Click image for larger version

Name:	2.png
Views:	6
Size:	5.0 KB
ID:	450



    2. Verify if the patch is applied or not:
    • For Meltdown: CVE-2017-5754

    [root@24x7 ~]# rpm -q kernel-<version> --changelog | grep CVE-2017-5754
    • For Spectre : CVE-2017-5753 and CVE-2017-5715

    [root@24x7 ~]# rpm -q kernel-<version> --changelog --changelog | grep CVE-2017-5753
    [root@24x7 ~]# rpm -q kernel-<version> --changelog --changelog | grep CVE-2017-5715

    Click image for larger version

Name:	4.png
Views:	2
Size:	16.3 KB
ID:	448



    At this point if you see no output, then your system requires patching..

    3. Update the system to apply the patches:

    [root@24x7 ~]# yum update
    [root@24x7 ~]# yum update kernel (If kernel update is not passed in above update)

    Click image for larger version

Name:	update.png
Views:	2
Size:	28.6 KB
ID:	449



    4. Reboot the system and execute below command after reboot:
    [root@24x7 ~]# uname -r
    <new_version>


    5. Verify the patches:
    • For Meltdown: CVE-2017-5754

    [root@24x7 ~]# rpm -q kernel-<new_version> --changelog | grep CVE-2017-5754

    Click image for larger version

Name:	5.png
Views:	2
Size:	236.9 KB
ID:	451
    • For Spectre : CVE-2017-5753 and CVE-2017-5715

    [root@24x7 ~]# rpm -q kernel-<new_version> --changelog | grep CVE-2017-5753

    Click image for larger version

Name:	6.png
Views:	2
Size:	55.8 KB
ID:	452


    [root@24x7 ~]# rpm -q kernel-<new_version> --changelog | grep CVE-2017-5715
    Click image for larger version

Name:	7.png
Views:	1
Size:	236.1 KB
ID:	453



    Positive output will ensure your system is patched.
Working...
X