Server Audit: MDS Bug Detect by kernel journalctl
Posted: Wed Jul 03, 2019 3:29 pm
Hi, Im just auditing and viewing some logs on the server for possible threats.
Upon running the command for debugging kernel log:
I found this line:
I follow the link and found some information about. (YES IM AWARE OF THE RECENT NEW SPECTRE EXPLOIT). When I'm reading this, mitigation was recommended there, updating the microcode for the CPU from Intel. Open SuSE said that its provided on their package "ucode-intel" or "microcode_ctl". They also recommending turning off the hyper threading to mitigate shared cache on HT. Should I?
Here's the link for the SuSE CVE:
https://www.kernel.org/doc/html/latest/ ... n/mds.html
https://www.suse.com/support/kb/doc/?id=7023736
My question is how do I implement this? this microcode update (buffer / port flush feature) and other eles
Current Operation on company is:
5 Agent doing manual dial (sometimes predictive)
Current CPU: i74790 4C/8T
Thanks in advance!
Upon running the command for debugging kernel log:
- Code: Select all
jounalctl -p notice -b
I found this line:
- Code: Select all
Jul 03 12:33:26 (Hidden) kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details.
I follow the link and found some information about. (YES IM AWARE OF THE RECENT NEW SPECTRE EXPLOIT). When I'm reading this, mitigation was recommended there, updating the microcode for the CPU from Intel. Open SuSE said that its provided on their package "ucode-intel" or "microcode_ctl". They also recommending turning off the hyper threading to mitigate shared cache on HT. Should I?
Here's the link for the SuSE CVE:
https://www.kernel.org/doc/html/latest/ ... n/mds.html
https://www.suse.com/support/kb/doc/?id=7023736
My question is how do I implement this? this microcode update (buffer / port flush feature) and other eles
Current Operation on company is:
5 Agent doing manual dial (sometimes predictive)
Current CPU: i74790 4C/8T
Thanks in advance!