-
Notifications
You must be signed in to change notification settings - Fork 476
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
False vulnerability CVE-2020-0543? [Bug Report] #416
Comments
Your CPU doesn't seem to have the latest microcode to support SRBDS mitigation. |
I think it is a false vulnerability because my processor is an old Intel i7 3770k (3rd generation) and this suport SRBDS is related to a technology it don't have. |
Your CPU is indeed affected, first row of this table: |
Nothing I can do. Intel® Transactional Synchronization Extensions no Ok. I am out of support. |
I'm running a Xeon 1230 v2 (ivybridge) that is vulnerable to SRBDS on kernel 5.15.85-1 and intel-microcode 3.20221108.2 from debian testing and the tool reports that my system is vulnerable. I added srbds=on to kernel boot
|
For what I understand there is no mitigation for ivybridge microcode. No matter if you put SRBDS=on or off. Intel will not gonna give support for it. |
CPU supports Special Register Buffer Data Sampling (SRBDS): NO
CVE-2020-0543 aka ‘Special Register Buffer Data Sampling (SRBDS)’
Mitigated according to the /sys interface: NO (Vulnerable: No microcode)
SRBDS mitigation control is supported by the kernel: YES (found SRBDS implementation evidence in kernel image. Your kernel is up to date for SRBDS mitigation)
SRBDS mitigation control is enabled and active: NO
STATUS: VULNERABLE (Your CPU microcode may need to be updated to mitigate the vulnerability
The text was updated successfully, but these errors were encountered: