Re: [Test-Announce] Re: Call for testing: updates to address today's CPU/kernel vulnerability

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Brendan Conoboy wrote:
> This is probably where the "AMD is safe" rumor started, but that is
> only 1/3, maybe 2/3.  Now that the context is public let's be clear:
> even AMD processors are vulnerable without the patched kernel Adam has
> asked for help testing.

But the patched kernel that was pushed includes this patch:
https://src.fedoraproject.org/cgit/rpms/kernel.git/tree/x86-cpu-x86-pti-Do-not-enable-PTI-on-AMD-processors.patch?h=f27&id=4c66c4ff79b96a5725f65cc7447dff3d2e851fd8
which means the changes have no effect whatsoever on AMD CPUs unless you
explicitly boot with pti=on.

        Kevin Kofler
_______________________________________________
devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux