| .. | .. |
|---|
| 14 | 14 | to MDS attacks. |
|---|
| 15 | 15 | |
|---|
| 16 | 16 | Affected processors |
|---|
| 17 | | --------------------- |
|---|
| 17 | +------------------- |
|---|
| 18 | 18 | Core models (desktop, mobile, Xeon-E3) that implement RDRAND and/or RDSEED may |
|---|
| 19 | 19 | be affected. |
|---|
| 20 | 20 | |
|---|
| .. | .. |
|---|
| 59 | 59 | |
|---|
| 60 | 60 | |
|---|
| 61 | 61 | Mitigation mechanism |
|---|
| 62 | | -------------------- |
|---|
| 62 | +-------------------- |
|---|
| 63 | 63 | Intel will release microcode updates that modify the RDRAND, RDSEED, and |
|---|
| 64 | 64 | EGETKEY instructions to overwrite secret special register data in the shared |
|---|
| 65 | 65 | staging buffer before the secret data can be accessed by another logical |
|---|
| .. | .. |
|---|
| 118 | 118 | ============= ============================================================= |
|---|
| 119 | 119 | |
|---|
| 120 | 120 | SRBDS System Information |
|---|
| 121 | | ------------------------ |
|---|
| 121 | +------------------------ |
|---|
| 122 | 122 | The Linux kernel provides vulnerability status information through sysfs. For |
|---|
| 123 | 123 | SRBDS this can be accessed by the following sysfs file: |
|---|
| 124 | 124 | /sys/devices/system/cpu/vulnerabilities/srbds |
|---|