Comments on Spectre and Meltdown CPU Vulnerability Test and Microcode Update on Linux
This tutorial covers an introduction to Spectre & Meltdown CPU Vulnerabilities, a test to find out if your hardware is affected and instructions on how to install Intel Microcode updates to fix the issue on Linux.
3 Comment(s)
Comments
Hi, thanks for this.
On a core2duo, Debian Stretch, script result is nok for two cve but microcode is up to date :
SUMMARY: CVE-2017-5753:OK CVE-2017-5715:OK CVE-2017-5754:OK CVE-2018-3640:KO CVE-2018-3639:KO CVE-2018-3615:OK CVE-2018-3620:OK CVE-2018-3646:OK
root@krispc:/tmp# dmesg | grep microcode[ 0.786490] microcode: sig=0x1067a, pf=0x1, revision=0xa0b[ 0.786526] microcode: Microcode Update Driver: v2.01 <[email protected]>, Peter Oruba
root@krispc:/tmp# apt install intel-microcode Lecture des listes de paquets... FaitConstruction de l'arbre des dépendances Lecture des informations d'état... Faitintel-microcode is already the newest version (3.20180807a.1~deb9u1).
What is the solution in this case please ?
There is no microcode update for Core2Duo, Penryn, Wolfdale and Yorkdale all stopped as 02 Apr 18.
Winactive is correct. Core 2 Duo is shown on page 12 of this document indicating that Intel has decided not to patch it.
https://newsroom.intel.com/wp-content/uploads/sites/11/2018/04/microcode-update-guidance.pdf