Re: [Test-Announce] Re: Call for testing: updates to address today's CPU/kernel vulnerability

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



>> This is probably where the "AMD is safe" rumor started, but that is
>> only 1/3, maybe 2/3.  Now that the context is public let's be clear:
>> even AMD processors are vulnerable without the patched kernel Adam has
>> asked for help testing.
>
> But the patched kernel that was pushed includes this patch:
> https://src.fedoraproject.org/cgit/rpms/kernel.git/tree/x86-cpu-x86-pti-Do-not-enable-PTI-on-AMD-processors.patch?h=f27&id=4c66c4ff79b96a5725f65cc7447dff3d2e851fd8
> which means the changes have no effect whatsoever on AMD CPUs unless you
> explicitly boot with pti=on.

As far as currently known, AMD CPUs are not affected by "meltdown" -
the security vulnerability which pti tries to close.
There are other issues known as "Spectre" where pti does not help and
which does not only affect Intel CPUs.

Best regards, Clemens
_______________________________________________
devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux