我安装了英特尔-微码,但当我使用./幽灵熔毁-检查. use我得到这个。
CVE-2018-12127 aka 'RIDL, microarchitectural load port data sampling (MLPDS)'
* Mitigated according to the /sys interface: NO (Vulnerable: Clear CPU buffers attempted, no microcode; SMT disabled)
* Kernel supports using MD_CLEAR mitigation: YES (found md_clear implementation evidence in kernel image)
* Kernel mitigation is enabled and active: NO
* SMT is either mitigated or disabled: YES
> STATUS: VULNERABLE (Vulnerable: Clear CPU buffers attempted, no microcode; SMT disabled)我该怎么解决呢?我不明白
sudo ./spectre-meltdown-checker.sh | grep 'CPU microcode is'
[sudo] password for user:
* CPU microcode is known to cause stability problems: NO (model 0x2d family 0x6 stepping 0x7 ucode 0x710 cpuid 0x206d7)
* CPU microcode is the latest known available version: NO (latest version is 0x714 dated 2018/05/08 according to builtin MCExtractor DB v112 - 2019/05/22)
IBPB is considered as a good addition to retpoline for Variant 2 mitigation, but your CPU microcode doesn't support it
> STATUS: VULNERABLE (an up-to-date CPU microcode is needed to mitigate this vulnerability)但这是最新的
sudo apt install intel-microcode
Reading package lists... Done
Building dependency tree
Reading state information... Done
intel-microcode is already the newest version (3.20180807a.2~deb9u1).发布于 2019-06-24 01:46:51
在/etc/apt/ security .列表中的安全回购中是否启用了非免费的功能?
deb http://security.debian.org/ stretch/updates main contrib non-free如果不是,启用非免费,apt-获取更新,并再次安装英特尔微码.它会安装一个新的软件包。重新启动并再次尝试幽灵-熔毁检查器。
发布于 2019-06-24 08:01:21
您的CPU需要微码0x718来修复Fallout和RIDL;这是添加到intel-microcode中的20190618更新中的,在您上次更新时配置的存储库中是不可用的。
现在有了作为Debian 9的安全更新而被推送.,下次运行时应该会得到升级。
apt update && apt upgrade(作为根)。相应的软件包版本为3.20190618.1~deb9u1。
您需要重新启动以应用微码更新。
https://unix.stackexchange.com/questions/526284
复制相似问题