[linux] lscpu: wat te doen bij cpu-kwetsbaarheden?
André Ockers
andre op ockers.eu
Vr Sep 6 19:05:59 CEST 2024
Beste NLLGG'er,
Wat zou u doen bij deze cpu-kwetsbaarheden?
Mijn output van $ lscpu is:
--
Vulnerabilities:
Gather data sampling: Not affected
Itlb multihit: KVM: Mitigation: VMX disabled
L1tf: Mitigation; PTE Inversion; VMX EPT disabled
Mds: Vulnerable: Clear CPU buffers attempted, no
microcode; SMT disabled
Meltdown: Mitigation; PTI
Mmio stale data: Unknown: No mitigations
Reg file data sampling: Not affected
Retbleed: Not affected
Spec rstack overflow: Not affected
Spec store bypass: Vulnerable
Spectre v1: Mitigation; usercopy/swapgs barriers and __user
pointer sanitization
Spectre v2: Mitigation; Retpolines; STIBP disabled; RSB
filling; PBRSB-eIBRS Not affected; BHI Not affected
Srbds: Not affected
Tsx async abort: Not affected
--
Met vriendelijke groet,
André Ockers
Lid NLLGG
Meer informatie over de Linux
maillijst