Re: Intel Vulnerability
05.01.2018, 10:16, "Yves-Alexis Perez" <corsac@debian.org>:
> On Fri, 2018-01-05 at 10:07 +0300, Ozgur wrote:
>> I talked yesterday Debian kernel team and was a work on Debian kernel for
>> the latest stable, I think all users add to "x86_64_BUG_CPU_INSECURE"
>> parameter .config file and add "= y" added and recompiled.
>
> Hi Ozgur,
Hello Alexis,
thanks for reply and I'm using the stable version (Debian stretch). I updated last night and I don't seen any new kernel patch yet.
sources.list:
deb http://security.debian.org/debian-security stretch/updates main contrib non-free
deb-src http://security.debian.org/debian-security stretch/updates main contrib non-free
deb http://deb.debian.org/debian/ stretch-updates main contrib non-free
deb-src http://deb.debian.org/debian/ stretch-updates main contrib non-free
deb http://deb.debian.org/debian/ stretch main contrib non-free
deb-src http://deb.debian.org/debian/ stretch main contrib non-free
$ uname -ar
Linux laptop.debian.local 4.9.0-5-amd64 #1 SMP Debian 4.9.65-3+deb9u2 (2018-01-04) x86_64 GNU/Linux
Regards
Ozgur
> that's completely irrelevant. For Meltdown fix on Stretch/amd64, please
> upgrade to the just published linux-image-4.9.0-5-amd64 version 4.9.65-3+deb9u2.
>
> Regards,
> --
> Yves-Alexis
Reply to: