[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Intel Vulnerability




05.01.2018, 10:16, "Yves-Alexis Perez" <corsac@debian.org>:
> On Fri, 2018-01-05 at 10:07 +0300, Ozgur wrote:
>>  I talked yesterday Debian kernel team and was a work on Debian kernel for
>>  the latest stable, I think all users add to "x86_64_BUG_CPU_INSECURE"
>>  parameter .config file and add "= y" added and recompiled.
>
> Hi Ozgur,

Hello Alexis,

thanks for reply and I'm using the stable version (Debian stretch). I updated last night and I don't seen any new kernel patch yet.

sources.list:

deb http://security.debian.org/debian-security stretch/updates main contrib non-free
deb-src http://security.debian.org/debian-security stretch/updates main contrib non-free

deb http://deb.debian.org/debian/ stretch-updates main contrib non-free
deb-src http://deb.debian.org/debian/ stretch-updates main contrib non-free

deb http://deb.debian.org/debian/ stretch main contrib non-free
deb-src http://deb.debian.org/debian/ stretch main contrib non-free

$ uname -ar
Linux laptop.debian.local 4.9.0-5-amd64 #1 SMP Debian 4.9.65-3+deb9u2 (2018-01-04) x86_64 GNU/Linux

Regards

Ozgur

> that's completely irrelevant. For Meltdown fix on Stretch/amd64, please
> upgrade to the just published linux-image-4.9.0-5-amd64 version 4.9.65-3+deb9u2.
>
> Regards,
> --
> Yves-Alexis


Reply to: