<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerability to Spectre Variant #2 after patching DL380 Gen9 Server running RHEL 7.4 in ProLiant Servers (ML,DL,SL)</title>
    <link>https://community.hpe.com/t5/proliant-servers-ml-dl-sl/vulnerability-to-spectre-variant-2-after-patching-dl380-gen9/m-p/7016797#M163777</link>
    <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please refer to the below advisory links.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00048185en_us&amp;nbsp;" target="_blank"&gt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00048185en_us&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://access.redhat.com/security/vulnerabilities/speculativeexecution&amp;nbsp;" target="_blank"&gt;https://access.redhat.com/security/vulnerabilities/speculativeexecution&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;You have to install the updated drivers . The drivers are included in the custom SPP which can be obtained from&amp;nbsp;&lt;A href="http://retpoline.linux.hpe.com/" target="_blank"&gt;http://retpoline.linux.hpe.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;From,&lt;/P&gt;&lt;P&gt;HPE Technical Team Member&lt;/P&gt;</description>
    <pubDate>Mon, 03 Sep 2018 04:40:15 GMT</pubDate>
    <dc:creator>Kashyap02</dc:creator>
    <dc:date>2018-09-03T04:40:15Z</dc:date>
    <item>
      <title>Vulnerability to Spectre Variant #2 after patching DL380 Gen9 Server running RHEL 7.4</title>
      <link>https://community.hpe.com/t5/proliant-servers-ml-dl-sl/vulnerability-to-spectre-variant-2-after-patching-dl380-gen9/m-p/7016472#M163736</link>
      <description>&lt;P&gt;I have servers on a customer site still showing as vulnerable to Spectre Variant #2, this is after applying the June 2018 SPP and the latest Red Hat patches for RHEL 7.4 (We need to stay at RHEL 7.4 for the moment and not jump to RHEL 7.5, for&amp;nbsp;political rather than technical reasons).&amp;nbsp; Running kernel is 3.10.0-693.37.4.el7.x86_64.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have also installed the latest Mellanox firmware.&lt;/P&gt;&lt;P&gt;When running the Red Hat detection script from &lt;A href="https://access.redhat.com/security/vulnerabilities/speculativeexecution" target="_blank"&gt;https://access.redhat.com/security/vulnerabilities/speculativeexecution&lt;/A&gt; I get:&lt;BR /&gt;&lt;BR /&gt;Variant #2 (Spectre): Vulnerable: Retpoline with unsafe module(s)&lt;BR /&gt;CVE-2017-5715 - speculative execution branch target injection&lt;BR /&gt;- Kernel with mitigation patches: OK&lt;BR /&gt;- HW support / updated microcode: YES&lt;BR /&gt;- IBRS: Not disabled on kernel commandline&lt;BR /&gt;- IBPB: Not disabled on kernel commandline&lt;BR /&gt;- Retpolines: Not disabled on kernel commandline&lt;BR /&gt;&lt;BR /&gt;$ sudo cat /sys/devices/system/cpu/vulnerabilities/spectre_v2&lt;BR /&gt;Vulnerable: Retpoline with unsafe module(s)&lt;/P&gt;&lt;P&gt;One server shows:&lt;/P&gt;&lt;P&gt;$ awk '{module=$1; retpcheck="modinfo "module" | grep -c retpoline"; retpcheck | getline found; close(retpcheck); if (!found) {print "VULNERABLE - No Retpoline found - "module}}' /proc/modules&lt;BR /&gt;VULNERABLE - No Retpoline found - knem&lt;BR /&gt;VULNERABLE - No Retpoline found - tg3&lt;/P&gt;&lt;P&gt;Another returns:&lt;/P&gt;&lt;P&gt;$ awk '{module=$1; retpcheck="modinfo "module" | grep -c retpoline"; retpcheck | getline found; close(retpcheck); if (!found) {print "VULNERABLE - No Retpoline found - "module}}' /proc/modules&lt;BR /&gt;VULNERABLE - No Retpoline found - knem&lt;BR /&gt;VULNERABLE - No Retpoline found - mst_pciconf&lt;BR /&gt;VULNERABLE - No Retpoline found - mst_pci&lt;BR /&gt;VULNERABLE - No Retpoline found - tg3&lt;BR /&gt;VULNERABLE - No Retpoline found - hpsa&lt;/P&gt;&lt;P&gt;I have raised two HPE support cases, created a case with Red Hat and reported to the HPE vulnerability team.&lt;/P&gt;&lt;P&gt;Does anyone have experience in this area? What am I missing?&lt;/P&gt;&lt;P&gt;Looking at 'knem' for example I have July 2018 builds installed.&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;$ rpm -qi kmod-knem-1.1.3.90mlnx1-OFED.4.3.0.1.4.1.g8cf97c1.rhel7u4.x86_64&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : kmod-knem&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Build Date&amp;nbsp; : Tue 03 Jul 2018 04:52:54 AM EDT&lt;/P&gt;&lt;P&gt;$ rpm -qi kmod-knem-1.1.3.90mlnx1-OFED.4.3.0.1.4.1.g8cf97c1.rhel7u4.x86_64&lt;/P&gt;&lt;P&gt;Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : kmod-knem&lt;/P&gt;&lt;P&gt;Build Date&amp;nbsp; : Tue 03 Jul 2018 04:52:54 AM EDT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;Ian&lt;/P&gt;</description>
      <pubDate>Thu, 30 Aug 2018 09:21:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/proliant-servers-ml-dl-sl/vulnerability-to-spectre-variant-2-after-patching-dl380-gen9/m-p/7016472#M163736</guid>
      <dc:creator>ltfciano1</dc:creator>
      <dc:date>2018-08-30T09:21:56Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability to Spectre Variant #2 after patching DL380 Gen9 Server running RHEL 7.4</title>
      <link>https://community.hpe.com/t5/proliant-servers-ml-dl-sl/vulnerability-to-spectre-variant-2-after-patching-dl380-gen9/m-p/7016797#M163777</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please refer to the below advisory links.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00048185en_us&amp;nbsp;" target="_blank"&gt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00048185en_us&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://access.redhat.com/security/vulnerabilities/speculativeexecution&amp;nbsp;" target="_blank"&gt;https://access.redhat.com/security/vulnerabilities/speculativeexecution&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;You have to install the updated drivers . The drivers are included in the custom SPP which can be obtained from&amp;nbsp;&lt;A href="http://retpoline.linux.hpe.com/" target="_blank"&gt;http://retpoline.linux.hpe.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;From,&lt;/P&gt;&lt;P&gt;HPE Technical Team Member&lt;/P&gt;</description>
      <pubDate>Mon, 03 Sep 2018 04:40:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/proliant-servers-ml-dl-sl/vulnerability-to-spectre-variant-2-after-patching-dl380-gen9/m-p/7016797#M163777</guid>
      <dc:creator>Kashyap02</dc:creator>
      <dc:date>2018-09-03T04:40:15Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability to Spectre Variant #2 after patching DL380 Gen9 Server running RHEL 7.4</title>
      <link>https://community.hpe.com/t5/proliant-servers-ml-dl-sl/vulnerability-to-spectre-variant-2-after-patching-dl380-gen9/m-p/7016876#M163792</link>
      <description>&lt;P&gt;Thanks for the links Kashyap02, I don't know why suppport didn't provide these.&lt;/P&gt;&lt;P&gt;It's helped as tg3 and hpsa are no longer showing as vulnerable, but&amp;nbsp;Mellanox drivers/firmware are still reporting:&lt;/P&gt;&lt;P&gt;$ awk '{module=$1; retpcheck="modinfo "module" | grep -c retpoline"; retpcheck | getline found;&amp;nbsp; close(retpcheck); if (!found) {print "VULNERABLE - No Retpoline found - "module}}' /proc/modules&lt;/P&gt;&lt;P&gt;VULNERABLE - No Retpoline found - knem&lt;/P&gt;&lt;P&gt;VULNERABLE - No Retpoline found - mst_pciconf&lt;/P&gt;&lt;P&gt;VULNERABLE - No Retpoline found - mst_pci&lt;/P&gt;&lt;P&gt;This is despite installing the latest drivers I can locate on hpe.com and mellanox.com.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Sep 2018 10:44:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/proliant-servers-ml-dl-sl/vulnerability-to-spectre-variant-2-after-patching-dl380-gen9/m-p/7016876#M163792</guid>
      <dc:creator>ltfciano1</dc:creator>
      <dc:date>2018-09-03T10:44:42Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability to Spectre Variant #2 after patching DL380 Gen9 Server running RHEL 7.4</title>
      <link>https://community.hpe.com/t5/proliant-servers-ml-dl-sl/vulnerability-to-spectre-variant-2-after-patching-dl380-gen9/m-p/7018237#M163959</link>
      <description>&lt;P&gt;Below is the Mellanox Infiniband and Ethernet driver for RHEL.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://support.hpe.com/hpsc/swd/public/detail?swItemId=MTX_b15d40146fdb40d5a558ccb08b#tab-history&amp;nbsp;" target="_blank"&gt;https://support.hpe.com/hpsc/swd/public/detail?swItemId=MTX_b15d40146fdb40d5a558ccb08b#tab-history&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Verify the latest version is installed. If yes, I would suggest you to provide the below details and open a support ticket with HPE.&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. NIC details&lt;/P&gt;&lt;P&gt;2. Firmware and drivers installed&lt;/P&gt;&lt;P&gt;3. Vulnerability check result.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&amp;nbsp;&lt;BR /&gt;I am an HPE Employee&lt;/P&gt;</description>
      <pubDate>Fri, 14 Sep 2018 06:57:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/proliant-servers-ml-dl-sl/vulnerability-to-spectre-variant-2-after-patching-dl380-gen9/m-p/7018237#M163959</guid>
      <dc:creator>Kashyap02</dc:creator>
      <dc:date>2018-09-14T06:57:24Z</dc:date>
    </item>
  </channel>
</rss>

