mirror of
https://github.com/Kicksecure/security-misc.git
synced 2025-11-25 11:46:23 -05:00
Update docs on CPU mitigations
This commit is contained in:
parent
4340bf50b7
commit
635c216d4e
2 changed files with 4 additions and 3 deletions
|
|
@ -142,9 +142,9 @@ and simultaneous multithreading (SMT) is disabled. See the
|
|||
`/etc/default/grub.d/40_cpu_mitigations.cfg` configuration file.
|
||||
|
||||
Importantly, we do not rely on the use of the already enabled-by-default `mitigations=auto`
|
||||
kernel boot parameter to perform CPU mitigations like many other distributions
|
||||
as not only is it's use totally redundant, but it also does not apply all hardening
|
||||
settings to their strictest possible levels. See issue: https://github.com/Kicksecure/security-misc/issues/199#issuecomment-3327391859.
|
||||
kernel boot parameter to perform CPU mitigations like many other distributions. This is
|
||||
because it's use is both totally redundant and it does not apply all hardening settings
|
||||
to their strictest possible levels. See issue: https://github.com/Kicksecure/security-misc/issues/199#issuecomment-3327391859.
|
||||
|
||||
Note, to achieve complete protection for known CPU vulnerabilities, the latest
|
||||
security microcode (BIOS/UEFI) updates must be installed on the system. Furthermore,
|
||||
|
|
|
|||
|
|
@ -40,6 +40,7 @@
|
|||
## We retain it here for completeness as many other distributions heavily rely on this for many CPU mitigations.
|
||||
##
|
||||
## https://github.com/Kicksecure/security-misc/issues/199#issuecomment-3327391859
|
||||
## https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/attack_vector_controls.html
|
||||
##
|
||||
## KSPP=no
|
||||
## KSPP sets the kernel parameters.
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue