Comments on Spectre and Meltdown CPU Vulnerability Test and Microcode Update on Linux

This tutorial covers an introduction to Spectre & Meltdown CPU Vulnerabilities, a test to find out if your hardware is affected and instructions on how to install Intel Microcode updates to fix the issue on Linux.

3 Comment(s)

Add comment

Please register in our forum first to comment.

Comments

By: kristof

Hi, thanks for this.

On a core2duo, Debian Stretch, script result is nok for two cve but microcode is up to date :

SUMMARY: CVE-2017-5753:OK CVE-2017-5715:OK CVE-2017-5754:OK CVE-2018-3640:KO CVE-2018-3639:KO CVE-2018-3615:OK CVE-2018-3620:OK CVE-2018-3646:OK

root@krispc:/tmp# dmesg | grep microcode[    0.786490] microcode: sig=0x1067a, pf=0x1, revision=0xa0b[    0.786526] microcode: Microcode Update Driver: v2.01 <[email protected]>, Peter Oruba

       root@krispc:/tmp# apt install intel-microcode Lecture des listes de paquets... FaitConstruction de l'arbre des dépendances       Lecture des informations d'état... Faitintel-microcode is already the newest version (3.20180807a.1~deb9u1).

What is the solution in this case please ?

By: winactive

There is no microcode update for Core2Duo, Penryn, Wolfdale and Yorkdale all stopped as 02 Apr 18.

By: Damon

Winactive is correct. Core 2 Duo is shown on page 12 of this document indicating that Intel has decided not to patch it.

https://newsroom.intel.com/wp-content/uploads/sites/11/2018/04/microcode-update-guidance.pdf