Re: Intel Microcode updates

2024-12-07 Thread Henrique de Moraes Holschuh
Hello Elmar, I feel it is best to be very clear on this: I will *not* add automatic downloading of Intel microcode updates from unofficial place. The reasons are: 1. License issues. Non-negotiable. And this has been covered in this half-a-decade-old thread that raised from the grave, so I

Re: Intel Microcode updates

2019-06-24 Thread Davide Prina
On 24/06/19 01:57, Lou Poppler wrote: I am only guessing, but I think a possible explanation which resolves this conundrum might be this: The latest release page is saying that the latest microcode package contains the latest microcode for this Core2 processor, which is the version last updated

Re: Intel Microcode updates

2019-06-24 Thread Davide Prina
On 23/06/19 22:28, Henrique de Moraes Holschuh wrote: The README already tells you how to do it yourself, and people won't read it, why would them find about an example downloader script? $ zless /usr/share/doc/intel-microcode/README.Debian.gz [...] Custom Linux kernels must be built with init

Re: Intel Microcode updates

2019-06-23 Thread Henrique de Moraes Holschuh
On Sun, 23 Jun 2019, Elmar Stellnberger wrote: > As I read from the latest comments the microcode updates for Core 2 systems > are officially shipped by Intel via the internet though Intel denies this in Maybe you should fetch the Intel official release yourself and check it out yourself. -- H

Re: Intel Microcode updates

2019-06-23 Thread Lou Poppler
I am only guessing, but I think a possible explanation which resolves this conundrum might be this: The latest release page is saying that the latest microcode package contains the latest microcode for this Core2 processor, which is the version last updated on 2010-09-28. Not changed, but still m

Re: Intel Microcode updates

2019-06-23 Thread Elmar Stellnberger
If it is already described in the readme (I did not get this from the comments) then I´d consider that a good solution. I did not know. I will have to do that on my own in a short while because I still have many Core 2 systems. As I read from the latest comments the microcode updates for Core

Re: Intel Microcode updates

2019-06-23 Thread Henrique de Moraes Holschuh
On Tue, 18 Jun 2019, Elmar Stellnberger wrote: > Perhaps you could add a bash script that does automatically download the > microcode like f.i. winetricks does with windows code. That way one could be > more sure to use the right url for it. I also still have quite a lot of Core > 2 computers and w

Re: Intel Microcode updates

2019-06-23 Thread Davide Prina
On 11/06/19 04:19, Henrique de Moraes Holschuh wrote: On Mon, 10 Jun 2019, Russell Coker wrote: model name : Intel(R) Core(TM)2 Quad CPUQ9505 @ 2.83GHz Intel upstream decided to not distribute it, for whatever reason. The Core2 will not get any fixes for MDS either (nor will Nehale

Re: Intel Microcode updates

2019-06-22 Thread Elmar Stellnberger
Perhaps you could add a bash script that does automatically download the microcode like f.i. winetricks does with windows code. That way one could be more sure to use the right url for it. I also still have quite a lot of Core 2 computers and would thus profit from such a provision. Am 12.06.1

Re: Intel Microcode updates

2019-06-22 Thread Elmar Stellnberger
  Just because you disable Javascript in your browser I would not trust that you will be save from arbitrary code execution. I am using Thunderbird as an email client and it has the same intrusion problem as the browsers running Javascript. The arbitrary binary code execution problem does to my

Re: Intel Microcode updates

2019-06-20 Thread Rob van der Putten
Hi there On 18/06/2019 20:21, Andrew McGlashan wrote: It doesn't have to be JavaScript, it can be ANY scripting. Or any code. The whole idea of running software you don't know anything about is insane. When it comes to an updated browser, the exploit relies upon very precise timing differ

Re: Intel Microcode updates

2019-06-18 Thread Elmar Stellnberger
Perhaps you could add a bash script that does automatically download the microcode like f.i. winetricks does with windows code. That way one could be more sure to use the right url for it. I also still have quite a lot of Core 2 computers and would thus profit from such a provision. Am 12.06.1

Re: Intel Microcode updates

2019-06-18 Thread Elmar Stellnberger
  Just because you disable Javascript in your browser I would not trust that you will be save from arbitrary code execution. I am using Thunderbird as an email client and it has the same intrusion problem as the browsers running Javascript. The arbitrary binary code execution problem does to my

Re: Intel Microcode updates

2019-06-18 Thread Andrew McGlashan
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, On 12/6/19 3:16 am, Holger Levsen wrote: > On Wed, Jun 12, 2019 at 03:05:13AM +1000, Andrew McGlashan > wrote: >> Exploiting the flaws needs malicious code to be running >> on your box. If you are in total control over all

Re: Intel Microcode updates

2019-06-18 Thread Elmar Stellnberger
Perhaps you could add a bash script that does automatically download the microcode like f.i. winetricks does with windows code. That way one could be more sure to use the right url for it. I also still have quite a lot of Core 2 computers and would thus profit from such a provision. Am 12.06.1

Re: Intel Microcode updates

2019-06-18 Thread Elmar Stellnberger
  Just because you disable Javascript in your browser I would not trust that you will be save from arbitrary code execution. I am using Thunderbird as an email client and it has the same intrusion problem as the browsers running Javascript. The arbitrary binary code execution problem does to my

Re: Intel Microcode updates

2019-06-12 Thread Henrique de Moraes Holschuh
(BCC'd to #929073 to avoid dragging the BTS into this thread). On Tue, 11 Jun 2019, Moritz Mühlenhoff wrote: > Russell Coker schrieb: > > Should it be regarded as a bug in the intel-microcode package that it > > doesn't > > have this update that is "easy enough to source"? Or do you mean "easy

Re: Intel Microcode updates

2019-06-11 Thread Michael Stone
On Tue, Jun 11, 2019 at 08:00:49PM +0200, Davide Prina wrote: On 10/06/19 20:31, Michael Stone wrote: On Mon, Jun 10, 2019 at 07:46:47PM +0200, Davide Prina wrote: On 10/06/19 13:16, Michael Stone wrote: Your CPU is not supported my Intel, so you either accept the risk or buy a new one. you

Re: Intel Microcode updates

2019-06-11 Thread Andrew McGlashan
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, > On 12/6/19 3:16 am, Holger Levsen wrote: >> On Wed, Jun 12, 2019 at 03:05:13AM +1000, Andrew McGlashan >> wrote: >>> Exploiting the flaws needs malicious code to be running on your >>> box. If you are in total control over all VMs and proces

Re: Intel Microcode updates

2019-06-11 Thread Andrew McGlashan
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, On 12/6/19 3:16 am, Holger Levsen wrote: > On Wed, Jun 12, 2019 at 03:05:13AM +1000, Andrew McGlashan wrote: >> Exploiting the flaws needs malicious code to be running on your >> box. If you are in total control over all VMs and processes on

Re: Intel Microcode updates

2019-06-11 Thread Davide Prina
On 10/06/19 20:31, Michael Stone wrote: On Mon, Jun 10, 2019 at 07:46:47PM +0200, Davide Prina wrote: On 10/06/19 13:16, Michael Stone wrote: Your CPU is not supported my Intel, so you either accept the risk or buy a new one. you have another choice: disable the SMP & C. and all mitigation fo

Re: Intel Microcode updates

2019-06-11 Thread Holger Levsen
On Wed, Jun 12, 2019 at 03:05:13AM +1000, Andrew McGlashan wrote: > Exploiting the flaws needs malicious code to be running on your box. If > you are in total control over all VMs and processes on the box, then you > should be good. do you use a webbrowser with javascript enabled? -- tschau,

Re: Intel Microcode updates

2019-06-11 Thread Andrew McGlashan
Hi Russell, On 11/6/19 12:19 pm, Henrique de Moraes Holschuh wrote: > On Mon, 10 Jun 2019, Russell Coker wrote: >> model name : Intel(R) Core(TM)2 Quad CPUQ9505 @ 2.83GHz The first thing to think about with all of these problems is, are you /really/ affected ie, are you at risk? No

Re: Intel Microcode updates

2019-06-11 Thread Moritz Mühlenhoff
Russell Coker schrieb: > Should it be regarded as a bug in the intel-microcode package that it doesn't > have this update that is "easy enough to source"? Or do you mean "easy to > get > but not licensed for distribution"? This is covered by #929073, which links to a PDF by Intel (which docum

Re: Intel Microcode updates

2019-06-11 Thread Russell Coker
On Monday, 10 June 2019 9:16:02 PM AEST Michael Stone wrote: > Your CPU is not supported my Intel, so you either accept the risk or buy > a new one. (Note that the latest version of the microcode is from > 2015--long before any of these speculative execution vulnerabilities > were mitigated.) Yours

Re: Intel Microcode updates

2019-06-11 Thread Russell Coker
On Tuesday, 11 June 2019 12:19:14 PM AEST Henrique de Moraes Holschuh wrote: > On Mon, 10 Jun 2019, Russell Coker wrote: > > model name : Intel(R) Core(TM)2 Quad CPUQ9505 @ 2.83GHz > > > > On a system with the above CPU running Debian/Testing I get the following > > results from the spec

Re: Intel Microcode updates

2019-06-10 Thread Henrique de Moraes Holschuh
On Mon, 10 Jun 2019, Russell Coker wrote: > model name : Intel(R) Core(TM)2 Quad CPUQ9505 @ 2.83GHz > > On a system with the above CPU running Debian/Testing I get the following > results from the spectre-meltdown-checker script. Is this a bug in the intel- > microcode package that the

Re: Intel Microcode updates

2019-06-10 Thread Michael Stone
On Mon, Jun 10, 2019 at 07:46:47PM +0200, Davide Prina wrote: On 10/06/19 13:16, Michael Stone wrote: Your CPU is not supported my Intel, so you either accept the risk or buy a new one. you have another choice: disable the SMP & C. and all mitigation form Linux That's not correct, but will s

Re: Intel Microcode updates

2019-06-10 Thread Davide Prina
On 10/06/19 13:16, Michael Stone wrote: On Mon, Jun 10, 2019 at 02:01:25PM +1000, Russell Coker wrote: I just discovered the spectre-meltdown-checker package model name  : Intel(R) Core(TM)2 Quad CPU    Q9505  @ 2.83GHz Your CPU is not supported my Intel, so you either accept the risk o

Re: Intel Microcode updates

2019-06-10 Thread Michael Stone
On Mon, Jun 10, 2019 at 02:01:25PM +1000, Russell Coker wrote: I just discovered the spectre-meltdown-checker package (thanks Sylvestre for packaging this). model name : Intel(R) Core(TM)2 Quad CPUQ9505 @ 2.83GHz On a system with the above CPU running Debian/Testing I get the followin

Intel Microcode updates

2019-06-09 Thread Russell Coker
I just discovered the spectre-meltdown-checker package (thanks Sylvestre for packaging this). model name : Intel(R) Core(TM)2 Quad CPUQ9505 @ 2.83GHz On a system with the above CPU running Debian/Testing I get the following results from the spectre-meltdown-checker script. Is this a