Announcement

Collapse
No announcement yet.

MDS: The Newest Speculative Execution Side-Channel Vulnerability

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • #41
    I have a i7-6700hq laptop and at the moment I've disabled smt (hyperthreading) since it was vulnerable also with the latest archlinux kernel and intel-ucode updates.
    Is someone working on properly mitigate mds and l1tf even when smt is active?

    Comment


    • #42
      Originally posted by Xwaang View Post
      Is someone working on properly mitigate mds and l1tf even when smt is active?
      no, no one is working on that. it's not possible to properly mitigate MDS with SMT active.

      Comment


      • #43
        Originally posted by hotaru View Post

        no, no one is working on that. it's not possible to properly mitigate MDS with SMT active.
        So if someone with a bugged Intel chip wants to be safe, he/she must disable smt (hyperthreading) until he/she changes its cpu. Is it correct?

        Comment


        • #44
          Originally posted by Xwaang View Post

          So if someone with a bugged Intel chip wants to be safe, he/she must disable smt (hyperthreading) until he/she changes its cpu. Is it correct?
          if you want to be completely safe from MDS, yes, that's correct.

          Comment

          Working...
          X