[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Is Debian Linux protected against the Meltdown and Spectre security flaws?



On Mon, 26 Feb 2018, Curt wrote:
> What does that mean 'bugs           : cpu_meltdown spectre_v1 spectre_v2
> exactly?

It it is supposed to mean your processor has those defects.  It does not
say anything about the mitigation strategy being employed to avoid those
defects.

Obviously, that thing is buggy, since it is listing cpu_meltdown on an
AMD box...  meh.

Hopefully to be corrected by the next round of kernel updates, along
with an updated Intel microcode blacklist, required to use the microcode
updates Intel "un-recalled" :p

> curty@einstein:~$ grep . /sys/devices/system/cpu/vulnerabilities/*
> /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected

At least this one is correct...

> /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user
> pointer sanitization
> /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD
> retpoline

And so are those.

> The directly above seems more comforting in its verbose clarity somehow.

Indeed.

-- 
  Henrique Holschuh


Reply to: