CVE-2018-5407: new side-channel vulnerability on SMT/Hyper-Threading architectures

For interesting topics. But remember this is a Linux Forum. Do not post offensive topics that are meant to cause trouble with other members or are derogatory towards people of different genders, race, color, minors (this includes nudity and sex), politics or religion. Let's try to keep peace among the community and for visitors.

No spam on this or any other forums please! If you post advertisements on these forums, your account may be deleted.

Do not copy and paste entire or even up to half of someone else's words or articles into posts. Post only a few sentences or a paragraph and make sure to include a link back to original words or article. Otherwise it's copyright infringement.

You can talk about other distros here, but no MX bashing. You can email the developers of MX if you just want to say you dislike or hate MX.
Post Reply
Message
Author
User avatar
handy
Posts: 611
Joined: Mon Apr 23, 2018 2:00 pm

CVE-2018-5407: new side-channel vulnerability on SMT/Hyper-Threading architectures

#1 Post by handy »

Another Intel CPU vulnerability:

https://seclists.org/oss-sec/2018/q4/123

This is a slightly older post from Theo de Raadt on intel's hyperthreading:

https://marc.info/?l=openbsd-tech&m=153504937925732&w=2
1_MSI: MAG B560 TORP', i5, RAM 16GB, GTX 1070 Ti 12GB, M2 238GB + USB, MX-23 Fb to Openbox
2_Lenovo: Ideapad 520S, i5, RAM 8GB, GPU i620, HDD 1TB, MX-21 - Openbox
3_Clevo: P150SM-A, i7, RAM 16GB, nVidia 8600, 2x 1TB HDD & M.2 256 GB, MX-21 - Openbox

User avatar
Stevo
Developer
Posts: 12837
Joined: Fri Dec 15, 2006 8:07 pm

Re: CVE-2018-5407: new side-channel vulnerability on SMT/Hyper-Threading architectures

#2 Post by Stevo »

If you can't disable hyperthreading in your UEFI /BIOS settings, apparently you can write a udev rule for each real core: http://forums.debian.net/viewtopic.php?f=16&t=138972

Post Reply

Return to “General”