lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 15 Jan 2018 17:05:45 -0800 From: Akemi Yagi <toracat@...epo.org> To: David Lang <david@...g.hm> Cc: linux-kernel@...r.kernel.org Subject: Re: Reg : Spectre & Meltdown On Mon, Jan 15, 2018 at 4:50 PM, David Lang <david@...g.hm> wrote: > the 4.4.112 patches that Greg just posted include a bunch of work for these > vulnerabilities. > > Who knows what has been backported to the kernel he is running. > k In RHEL (therefore CentOS), microcode comes from the microcode_ctl package which is currently at 2.1-22.2.el7. If you get the latest from Intel ( https://downloadcenter.intel.com/download/27431/Linux-Processor-Microcode-Data-File ), that will update the microcode on your system to "date = 2017-11-20". As far as I can see, that changes the test result of 'Spectre Variant 2' from vuln to Not vuln. Akemi
Powered by blists - more mailing lists