From owner-freebsd-security@freebsd.org Sun May 26 14:18:14 2019 Return-Path: Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 14AF815A7968 for ; Sun, 26 May 2019 14:18:14 +0000 (UTC) (envelope-from frenezahomo@gmail.com) Received: from mail-ot1-x335.google.com (mail-ot1-x335.google.com [IPv6:2607:f8b0:4864:20::335]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 7E04088DDC for ; Sun, 26 May 2019 14:18:12 +0000 (UTC) (envelope-from frenezahomo@gmail.com) Received: by mail-ot1-x335.google.com with SMTP id r10so12699665otd.4 for ; Sun, 26 May 2019 07:18:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=to:from:openpgp:autocrypt:subject:message-id:date:user-agent :mime-version; bh=Eu+PkOkxrkv1cFuvEiPra/UdFNUgUbowA9EFBTTzhUY=; b=g8RjU7A7jAzHA+mLE2oOUrndEeDstBsDWH0bb4G9NHBH01OaS+825WtjYRLwYXuMec f7QpZCrFLKNw+mDX5Je72JdEIoA20I93UR9OL3mA/khPrDitjO5PBQtd573aB36/e6+C KqhNndEJHHupjt3JHvQ2L3CR0XRNaBjBxEJ4uI+mApau1UbQ+8O5xbfxVt3KKRGrOKXk hhvS+S0fCQJtu51cypZ+Ve3tfe/CI9lkiXYvw/eR4jgvQ6BKv7nM3l2jVwnYwhn43LUZ MAOO+2FpPqoF/b499o4W9jtdyFi8n6Xq9SLPfE9SNrr1cAg1IyxojP2F7WCa70kpdPLP i/rA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:to:from:openpgp:autocrypt:subject:message-id :date:user-agent:mime-version; bh=Eu+PkOkxrkv1cFuvEiPra/UdFNUgUbowA9EFBTTzhUY=; b=ODsu/RFzeTyuWnDaOQfLbphjZOSfo1rHnFcToYQAF+/ki7Q6uBMjwJUI/VH/fsMIRX NoEmQGK9uuo6HvqpfOJdG+RY1YTG79jC1T+jmsA7BiBj+sSbjxtyLQ3MdS3aBx1Gnv+j MJk3BhjQEgX2bq08qCzRALJAicyGAnSAFowpsjH5UlQJVLIFx9gQDuBNrjHDZXXgDrTy 1zerWGUucGpLqXtfde8iA0kDLKDhQlYxoSflmvLRqCXKX+0QXOQgaehpsfa530qrVgv2 RRkSCK8bCkPefxJhLcyxiLpJKH3qt0B9WCzihBR+Bv8FNS42RA1LNFH4aV8WRdHglC0q 60LQ== X-Gm-Message-State: APjAAAV3f55Y8kCX+LV0Am4F+5SWPHpJDWWBFmjMYo5hhSorLXps2Xsb cbMEH+bAJWCpl51A0MtT5DvYiYCG X-Google-Smtp-Source: APXvYqwCdCdcJSKImx+XgrUI0Uq7N70oP+MOYzRLvv7DZYViyoKlqRyT8F0uWrDsiGT7Vg1WUXzRBg== X-Received: by 2002:a9d:4d0d:: with SMTP id n13mr68231328otf.314.1558880291384; Sun, 26 May 2019 07:18:11 -0700 (PDT) Received: from [0.0.0.0] (tor27.quintex.com. [199.249.230.80]) by smtp.gmail.com with ESMTPSA id p12sm2934163otq.57.2019.05.26.07.18.09 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 26 May 2019 07:18:10 -0700 (PDT) To: freebsd-security@freebsd.org From: freneza Openpgp: preference=signencrypt Autocrypt: addr=frenezahomo@gmail.com; keydata= mQINBFwC2jYBEAC7XQ+Z6Nwl7xt307wjuwFZc32M11Inds2otl6RrNR4F7m7M32ApqnvJ6y6 BX1/RCZrIZyqFmLVQq6IP8UK69Aiqgj/dmjdENicIOATxIF3iT83DyYArQiZnEtSOXeXWpWP cL1VT9oO1kFY0jgaLozeT89hu7vTn6INHucRgSGIMTi33peGdWpRWeG7FD78dA196mAmGmrS QBHWLvzWGx2wc2xcQZoOfjXIew358PHLfA4UslIYLvfzf+zAwY7DQ6FDZX03+NV4efdjQnGX ukH2k5JYFwy1q9rcgLlUnkMUzr6xC2FXrut9l2uz0jHzPzA6s3qYWlwp22+W08ZUb/YPDYQJ iLqlIKXQZZfVarbbuphhqJv86k6vpg3XTRTgzeGvdBVB3eXP8csIj4i0IhHKjw2kd6kb9m6E D5JGmggSUu4y4ykxpcmfBBGLkRLBr5+9my7yxgr3xT3kpMmNRp4E/iLeeLquwwxfvHJaUo7c vbOLHL9IyFQnbMVxNKxTZyWl4ntqyA/89ZTfaczFh94hcBHoACQsHJCRzVOpk7FuOsZM6yCQ em+oieBOBQaBOfUrriA73h/2kmtrPeOzv5o2kgihMMILpaZ2v9wyAjiUTlog//v7SL6qZ5P/ AM7m8L9scBMLUeLboinUjN2kqTazqntcPQJsfUD7kPOXhNiF3QARAQABtCRGcmVuZXphIEhv bW8gPGZyZW5lemFob21vQGdtYWlsLmNvbT6JAk4EEwEIADgCGwMFCwkIBwIGFQoJCAsCBBYC AwECHgECF4AWIQSfz0lsy5QSubqUPgaL4w9A+whqFgUCXNwZ3AAKCRCL4w9A+whqFjGAEACT 77atJr0OjxFrd1utYaWP0vAbCymqbnRNqDEldqWFo0/0cha2Bjt/L8IhNWfCca83YJc4MBa3 4URsQpqANqgrgmp9Uojy6WRgt329dEX274ZPVRGt0MfTd+Vtngvu3JaFO0rR4qCSKHvhnRJO WsVIIw3HULmqfD+0UBRP1OSUeBAJ10NXRaHdoxnnGwsW57ceClje5cFT4XAnX86vxa/Ak2z/ ydKsGgVPfdum5dzgj6OqTlAemEgciLsbPgKIiaI5hX+tx3PcWz5VHZQnS85TMpiEao7rhYOi hrx59HMVrYJh1iv+//+hNnKUnSbuxGM8fOoU6qp/UrLeXYc1z0VPB38S1EZHwv1/wG7qGe02 6rPLmHvZZin6FzcmtOh07R/P5wz0eDs5KkS+aa5S3P6Usg3Xm2MzNQ3LBVCktF6/8k7egcMt myplXawjsmN6s6+O2MG9uh5CtcJTapTIC0e6MDPTfE99eHthnibrxu/OX6RDpHIvd3/+1hjn WOXtCw1/IMebdkCB2Kr7ficVr7tqrs+FL79shFQXDQb2qZPmZcJPWoIptQ/sY8n/+qiKZKoR 2Lrgs4C0LWvQueCWjnRqT/u2TDElsobL8cUi89ihrpwtGcjyZCH8yEAv67s9YfJ5j5WgYNUg E6VXPT8RGz/nNXU238ylmmM+lnTjkC6xnrkCDQRcAto2ARAAwjr3t28WObzSZPyTnwTMhN4X pPYObRyAB0ats8Z0+wa0e+xnJ0N6ohFjm9oGgE9JSZMba++eY5YOhtlamKIE2/maqAB9Sp98 XIrjmDCtzWcJv4l++aqR1MzPERPTH7fpVa572EcUTXhXwROZHwOtZtPqo5W8fyqcoA2z8vNH ma6OuojK6/qqOITUWs30cz8b8NCgzzhDq2Ys4XEjpCRWD0ypaFXV+ope+B28VL5jrH5GpRKn N1wm00jXjRuCdy95EeJf5n+VGhmwaS3AdCmDZzflo4j8GV31Zta6RHeEH1BoI+NXD6NDWj9g GG4V+S/f0niXDpd2Cw1pk59+1xP4lF6LhvI0I/buzIcBGz0aelrTCHtVditH3z8qf/o4YrL/ KxfySFTr+qqJ9e9onMbKFsaPgSbp/1gK+F9/CpMSs5R2wVDKi1z/Lg+wJbSf8IVZP0x5Msuu CFkp1jr3BQRLk8u7oYKJU3QOSXC9iZsU3P85yVdqx/dy3/6fgY32DZBhHsNjaGAf3GSkOJlr AhuORHYf/Jnc5CeeksEwqHXLktIpsQFZEOLmZCJ8zws1SfAPzsoCD6Mpb0f9ToGp4x+eRk2S NZ4TtZ8HahFC+pfOEzItq6XVNZTuvF9YmemVXvXcyO/7GU2fmUBxs9Tvt4a0+UfgI1bw9kgO 9HWPLp9ynq8AEQEAAYkCNgQYAQgAIAIbDBYhBJ/PSWzLlBK5upQ+BovjD0D7CGoWBQJc3Bny AAoJEIvjD0D7CGoWt8AP/0u+6iBAUD7AWjmy7wTYL+9o4eq6Dlv7oI1ec2fgIr0DqovzXE7/ /8wkgGq1xqGkjsoorxX+Bb2yXigJ5PnTrw/4GsYS7gJWEmeTFC4r3qN5IZpPb3rcZ/Zodz9o TrIjKJ9wlEM2NgTHcPIGQ9zUnpQa6QPtw44SosyOnh9yLJ8nPin5Q1PZDXazjNel8k2SUVKd Esteh9HUwJS9tkWv/03bvqMw9Q7RG/yg/IKU/VpsChRwZ+vwvP+k8n2o9ndK/XDJfpEfIzFe beKcrmm4QzPG9QXKd+JbkEadXWbANwnxK5/TpIwnqr1iZjw+dSXwrUizC5zPIXLzzUg1WsF4 x/th2nHalVxIQ6a8kWFtsVe5M1WQW0JNG+4f7uu8kr0BUtOMeKkUkh2Oa8pryp8yO9gOOTRH 1/4mNJwNhr0vnaDfAIVKAmCSMWwjb8KVfT2xjApcRIw/UKjN0BbvogVwCC+AC9k9LBgWLZ6N EUjong7SMt57/i76C43K5trk07PfsI6VtQAPe5GFlVQWS3DRJsm/vDMjHmtcUkZOSloiCyyW yqNjF6CZQzGjiJc9MfYQK7dRjn67Jf1x6ZWf6wWdId0xvK0AemomRxQCpIJM5w9bDwUyNmEU hdtIrNwrfUc3GqJYBZH5FCEhjKw0HzU0iRvw1sFTPtLa+SLV0CGT/MQx Subject: CVE-2017-5753 (Spectre Variant 1, bounds check bypass) Message-ID: <95d36182-df26-be72-972e-2f468be4a939@gmail.com> Date: Sun, 26 May 2019 17:17:55 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="rlhuGywz1q8FDK3YsrquYYhaptCUXlIns" X-Rspamd-Queue-Id: 7E04088DDC X-Spamd-Bar: -------- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=g8RjU7A7; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of frenezahomo@gmail.com designates 2607:f8b0:4864:20::335 as permitted sender) smtp.mailfrom=frenezahomo@gmail.com X-Spamd-Result: default: False [-8.96 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; HAS_ATTACHMENT(0.00)[]; TO_DN_NONE(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; DKIM_TRACE(0.00)[gmail.com:+]; MX_GOOD(-0.01)[cached: alt3.gmail-smtp-in.l.google.com]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; NEURAL_HAM_SHORT(-1.00)[-0.999,0]; SIGNED_PGP(-2.00)[]; FROM_EQ_ENVFROM(0.00)[]; RCVD_TLS_LAST(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; MID_RHS_MATCH_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.20)[multipart/signed,multipart/mixed,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-security@freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; IP_SCORE(-2.85)[ip: (-8.59), ipnet: 2607:f8b0::/32(-3.30), asn: 15169(-2.29), country: US(-0.06)]; RCVD_IN_DNSWL_NONE(0.00)[5.3.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0] X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 26 May 2019 14:18:14 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --rlhuGywz1q8FDK3YsrquYYhaptCUXlIns Content-Type: multipart/mixed; boundary="FxP931YuQZA6rv4OEGtgn2e2SHfuB1mVL"; protected-headers="v1" From: freneza To: freebsd-security@freebsd.org Message-ID: <95d36182-df26-be72-972e-2f468be4a939@gmail.com> Subject: CVE-2017-5753 (Spectre Variant 1, bounds check bypass) --FxP931YuQZA6rv4OEGtgn2e2SHfuB1mVL Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Content-Language: en-US Greetings freebsd-security, Are there any plans to mitigate Spectre Variant 1? I ran `spectre-meltdown-checker.sh` from https://raw.githubusercontent.com/speed47/spectre-meltdown-checker/master= /spectre-meltdown-checker.sh and it says there is not mitigation for BSD yet. Knowing that all the CPU vulnerabilities were mitigated except this one, I'm unsure if the script is actually wrong. In addition, MDS was mitigated very quickly with advisories while I haven't heard any news about this one. Thank you --FxP931YuQZA6rv4OEGtgn2e2SHfuB1mVL-- --rlhuGywz1q8FDK3YsrquYYhaptCUXlIns Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEn89JbMuUErm6lD4Gi+MPQPsIahYFAlzqoBMACgkQi+MPQPsI ahZG2w//UT6DtmMR2LIo8TGJlFxBFA36aPNEVFnUcD2JYNKZPgO2XE8qfwPrNo06 DKdnussK9Lent6/FKP/xizkQLDKI342ILzcokjoYgE/6vGoBo/or6jJ4JMb28x66 VwTFG0LaXY4g2RoqdQnBcqGt5G2FPEUX2iMPqT14nDxDxdvGJJ4jusvScC25udxm YxgEtIR2JCJuFxl5L2E4oLg7UFILvL+RrnnEByK9LqQ4pawVubMI6p/HDKA7QdOK uLJHLOSRgAgXuORjxPhohC/oAuEgUVXvPhBHY71rhDsmfv/8mGm7p14e0qmG/ncx 7FFMo94uqFQUnkTjW0+h9oIRG5BjMXOysykwYrrri4Ptfb+lMWbFgRSLdjJm3qBa pmTGzoo2zjNorrLKnoc/XqNMVXV7DKSdbW1MlhEC3/rz1C0t4JBj9ebAvlpGs1e/ IgsfHxybfA3AsYYTBFQJpRD3D4aDeAJB7bosMpkFa1e6I0WMStjRb7UTkKoumFBG JYw0d8JnujNXMgwJ9bggejrA38lKwxLppmzfUpAb1X1tNrXptASqMU3VWiVS2sUN /FHK7qWFKUJhwwpKg88kPosExQovnO3Y0Yrtx8msqm1RJu+51wFs5yxcqtl3tfQk VikUBcyGR/Id3cOTVmzrd/AXNR9XgY2x4hPm2xp+ib9M0F8l4xo= =i3wF -----END PGP SIGNATURE----- --rlhuGywz1q8FDK3YsrquYYhaptCUXlIns-- From owner-freebsd-security@freebsd.org Sun May 26 14:24:59 2019 Return-Path: Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 9C6EA15A8553 for ; Sun, 26 May 2019 14:24:59 +0000 (UTC) (envelope-from lukasz@wasikowski.net) Received: from mail.freebsd.systems (mail.freebsd.systems [IPv6:2001:41d0:a:1dcd::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 003EF8946E for ; Sun, 26 May 2019 14:24:58 +0000 (UTC) (envelope-from lukasz@wasikowski.net) Received: from mail.freebsd.systems (mail.freebsd.systems [IPv6:2001:41d0:a:1dcd::1]) by mail.freebsd.systems (Postfix) with ESMTP id 29D86A68E for ; Sun, 26 May 2019 16:24:56 +0200 (CEST) X-Virus-Scanned: amavisd-new at freebsd.systems Received: from mail.freebsd.systems ([IPv6:2001:41d0:a:1dcd::1]) by mail.freebsd.systems (scan.freebsd.systems [IPv6:2001:41d0:a:1dcd::1]) (amavisd-new, port 10026) with ESMTP id NixtFV_qcocy for ; Sun, 26 May 2019 16:24:56 +0200 (CEST) Received: from [192.168.168.3] (89-70-50-99.dynamic.chello.pl [89.70.50.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.freebsd.systems (Postfix) with ESMTPSA id 9CC13A686 for ; Sun, 26 May 2019 16:24:55 +0200 (CEST) Authentication-Results: mail.freebsd.systems; dmarc=fail (p=none dis=none) header.from=wasikowski.net Authentication-Results: mail.freebsd.systems; spf=fail smtp.mailfrom=lukasz@wasikowski.net DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=wasikowski.net; s=default; t=1558880695; bh=BD3dKeaIXoGb6H5YLKjxkqqn4hxSOb7ywFVMag2QQDw=; h=To:References:From:Date:In-Reply-To; b=ecdZGP7l9uGz6wWPZxTN5zMWbcF2ewB5TKnxI5XVRpvk48ZkerZl8kUdKwdlPIzfH vJjfUrqKSvHrn1ir8g2aVF8ZI03+eMRCniCPfVe/KyUyyujrACF6S9UG0fYcw562ah VSQqaWjFDqoth5iUSYG4qhm6TxMEIr96/csp+5EWUvDoRhAQTGejxlVPbF+NFuJTkX JTv5cth9XYwQf8iATiAdVIjlXo+dpg6cNkR0N7cpcKepaFB0+DqdwRmyvjelNF7B1Y gt02oiP+iRIkFkJjTfbNl2pWGcNneCNsov9A03CAvupBlG9NNZZqB3sPxboyiWEwWJ ZoLQ2ZqBkooqQ== Subject: Re: CVE-2017-5753 (Spectre Variant 1, bounds check bypass) To: freebsd-security@freebsd.org References: <95d36182-df26-be72-972e-2f468be4a939@gmail.com> From: =?UTF-8?Q?=c5=81ukasz_W=c4=85sikowski?= Openpgp: preference=signencrypt Message-ID: Date: Sun, 26 May 2019 16:24:56 +0200 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0 MIME-Version: 1.0 In-Reply-To: <95d36182-df26-be72-972e-2f468be4a939@gmail.com> Content-Type: text/plain; charset=utf-8 Content-Language: pl Content-Transfer-Encoding: 8bit X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 26 May 2019 14:24:59 -0000 W dniu 2019-05-26 o 16:17, freneza pisze: > Are there any plans to mitigate Spectre Variant 1? > > I ran `spectre-meltdown-checker.sh` from > https://raw.githubusercontent.com/speed47/spectre-meltdown-checker/master/spectre-meltdown-checker.sh > and it says there is not mitigation for BSD yet. And how about retpoline for Spectre Variant 2? AFAIR FreeBSD use IBRS which is much slower than retpoline. -- best regards, Lukasz Wasikowski