[linux] lscpu: wat te doen bij cpu-kwetsbaarheden?

André Ockers andre op ockers.eu
Vr Sep 6 19:05:59 CEST 2024


Beste NLLGG'er,

Wat zou u doen bij deze cpu-kwetsbaarheden?
Mijn output van $ lscpu is:
--
Vulnerabilities:               
  Gather data sampling:        Not affected
  Itlb multihit:               KVM: Mitigation: VMX disabled
  L1tf:                        Mitigation; PTE Inversion; VMX EPT disabled
  Mds:                         Vulnerable: Clear CPU buffers attempted, no 
microcode; SMT disabled
  Meltdown:                    Mitigation; PTI
  Mmio stale data:             Unknown: No mitigations
  Reg file data sampling:      Not affected
  Retbleed:                    Not affected
  Spec rstack overflow:        Not affected
  Spec store bypass:           Vulnerable
  Spectre v1:                  Mitigation; usercopy/swapgs barriers and __user 
pointer sanitization
  Spectre v2:                  Mitigation; Retpolines; STIBP disabled; RSB 
filling; PBRSB-eIBRS Not affected; BHI Not affected
  Srbds:                       Not affected
  Tsx async abort:             Not affected
--
Met vriendelijke groet,

André Ockers
Lid NLLGG




Meer informatie over de Linux maillijst