.. | .. |
---|
14 | 14 | to MDS attacks. |
---|
15 | 15 | |
---|
16 | 16 | Affected processors |
---|
17 | | --------------------- |
---|
| 17 | +------------------- |
---|
18 | 18 | Core models (desktop, mobile, Xeon-E3) that implement RDRAND and/or RDSEED may |
---|
19 | 19 | be affected. |
---|
20 | 20 | |
---|
.. | .. |
---|
59 | 59 | |
---|
60 | 60 | |
---|
61 | 61 | Mitigation mechanism |
---|
62 | | -------------------- |
---|
| 62 | +-------------------- |
---|
63 | 63 | Intel will release microcode updates that modify the RDRAND, RDSEED, and |
---|
64 | 64 | EGETKEY instructions to overwrite secret special register data in the shared |
---|
65 | 65 | staging buffer before the secret data can be accessed by another logical |
---|
.. | .. |
---|
118 | 118 | ============= ============================================================= |
---|
119 | 119 | |
---|
120 | 120 | SRBDS System Information |
---|
121 | | ------------------------ |
---|
| 121 | +------------------------ |
---|
122 | 122 | The Linux kernel provides vulnerability status information through sysfs. For |
---|
123 | 123 | SRBDS this can be accessed by the following sysfs file: |
---|
124 | 124 | /sys/devices/system/cpu/vulnerabilities/srbds |
---|