Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Downfall #465

Open
Martinligabue opened this issue Aug 8, 2023 · 7 comments
Open

Downfall #465

Martinligabue opened this issue Aug 8, 2023 · 7 comments

Comments

@Martinligabue
Copy link

Can this vulnerability be added?

https://downfall.page/

@speed47
Copy link
Owner

speed47 commented Aug 8, 2023

Apparently the only possible mitigation is a microcode firmware update.
We'll see whether, once upgraded, the microcode exposes the information that it has mitigation for this vuln, still gathering data about this.

I'll at least be able to add affected/not affected check as the list of impacted CPUs has been published by Intel at their usual page (https://www.intel.com/content/www/us/en/developer/topic-technology/software-security-guidance/processors-affected-consolidated-product-cpu-model.html) and I now have a script to parse that and integrate it easily.

@Martinligabue
Copy link
Author

@speed47
Copy link
Owner

speed47 commented Aug 9, 2023

Yes indeed thanks!

@speed47
Copy link
Owner

speed47 commented Aug 9, 2023

Thanks @PandiPanda69 , I see contradictory information about Intel CPUs that support AVX2/512, that are out of support (a few years old), and not listed in the Kernel vuln blacklist. Intel won't say, and the kernel would deem them unaffected, but it seems contradictory to the Downfall white paper, which implies all models from 4th hen are affected...

@speed47
Copy link
Owner

speed47 commented Aug 10, 2023

Added a commit to your PR, can you test it, if possible?

@PandiPanda69
Copy link
Contributor

Tested on a different kind of CPU (Atom, ARM, AMD, Intel) with old ucode, new ucode, old kernel, patched kernel, vanilla & grsec, behavior is as expected 👍

@speed47
Copy link
Owner

speed47 commented Aug 10, 2023

Merged, thanks for your help.

I'm leaving this open because we still miss minor things to deem this complete, these will be implemented when I'm back from holidays:

  • offline mode support
  • kernel avx disabling detection without relying on dmesg

These are just convenience features, current code is enough to answer questions such as "am I affected/vulnerable?"

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants