1 |
On Wed, May 15, 2019 at 3:26 PM Adam Carter <adamcarter3@×××××.com> wrote: |
2 |
|
3 |
> Here we go again; |
4 |
> https://mdsattacks.com/ |
5 |
> |
6 |
> <snip? |
7 |
> |
8 |
> Sounds like AMD not affected. |
9 |
> |
10 |
|
11 |
AMD looks good; |
12 |
$ uname -a |
13 |
Linux proxy 5.1.2-gentoo #2 SMP Wed May 15 16:39:53 AEST 2019 x86_64 AMD |
14 |
Phenom(tm) II X4 965 Processor AuthenticAMD GNU/Linux |
15 |
$ cat /sys/devices/system/cpu/vulnerabilities/mds |
16 |
Not affected |
17 |
|
18 |
$ uname -a |
19 |
Linux phat 5.1.2-gentoo #1 SMP Wed May 15 16:31:06 AEST 2019 x86_64 AMD |
20 |
FX(tm)-8350 Eight-Core Processor AuthenticAMD GNU/Linux |
21 |
$ cat /sys/devices/system/cpu/vulnerabilities/mds |
22 |
Not affected |
23 |
|
24 |
But the skylake; |
25 |
$ uname -a |
26 |
Linux nuc 5.1.2-gentoo #2 SMP Wed May 15 16:35:17 AEST 2019 x86_64 Intel(R) |
27 |
Core(TM) i3-6100U CPU @ 2.30GHz GenuineIntel GNU/Linux |
28 |
$ cat /sys/devices/system/cpu/vulnerabilities/mds |
29 |
Mitigation: Clear CPU buffers; SMT vulnerable |