<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://dev1galaxy.org/extern.php?action=feed&amp;tid=7386&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / amd64-microcode update for transient scheduler attacks]]></title>
		<link>https://dev1galaxy.org/viewtopic.php?id=7386</link>
		<description><![CDATA[The most recent posts in amd64-microcode update for transient scheduler attacks.]]></description>
		<lastBuildDate>Fri, 28 Nov 2025 17:55:43 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: amd64-microcode update for transient scheduler attacks]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=60178#p60178</link>
			<description><![CDATA[<p>What&#039;s the point of shipping those microcode packages if the packagers themselves do not believe they&#039;re safe to apply? And because it&#039;s disabled by default, 99.several nines % of users who never look at the /etc/modprobe.d directory don&#039;t even know this package does nothing.</p><p>Is there a way to download a microcode directly from CPU manufacturer? Duck.ai sais no. There is a github repo with collection of firmwares.</p>]]></description>
			<author><![CDATA[dummy@example.com (Matlib)]]></author>
			<pubDate>Fri, 28 Nov 2025 17:55:43 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=60178#p60178</guid>
		</item>
		<item>
			<title><![CDATA[Re: amd64-microcode update for transient scheduler attacks]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=57768#p57768</link>
			<description><![CDATA[<p>this thread makes me want to dig out my Q6600 and Q8200 quad-core machines...iirc they still have beowulf on spinning rust...sounds like a rainy day endeavour.</p>]]></description>
			<author><![CDATA[dummy@example.com (stargate-sg1-cheyenne-mtn)]]></author>
			<pubDate>Tue, 02 Sep 2025 14:03:15 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=57768#p57768</guid>
		</item>
		<item>
			<title><![CDATA[Re: amd64-microcode update for transient scheduler attacks]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=57749#p57749</link>
			<description><![CDATA[<p>Hello:</p><div class="quotebox"><cite>greenjeans wrote:</cite><blockquote><div><p>... in my dmesg there&#039;s nothing about microcode until line 488 ...</p></div></blockquote></div><p>Well ...</p><p>Could be that ...&#160; &#160;(No idea, just shots in the dark.&#160; 8^°)</p><p>1. it is an AMD processor. ie: not Intel&#160; <br />2. it is much newer than my Q9550 (released Q1/2008)<br />3. my CPU gets updated early to a <span class="bbc">revision number</span> while yours gets the same type of update but to a <span class="bbc">new patch_level</span></p><p>Note the date on the microcode file (revision 0xa0b, date = 2010-09-28 - 15 years ago) while your patch level is not dated. </p><p>Q: do you have the <span class="bbc">amd64-microcode/stable 3.20240820.1~deb12u1</span> package installed?</p><p>Best,</p><p>A.</p>]]></description>
			<author><![CDATA[dummy@example.com (Altoid)]]></author>
			<pubDate>Mon, 01 Sep 2025 17:14:11 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=57749#p57749</guid>
		</item>
		<item>
			<title><![CDATA[Re: amd64-microcode update for transient scheduler attacks]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=57748#p57748</link>
			<description><![CDATA[<p>@Altoid, interesting, in my dmesg there&#039;s nothing about microcode until line 488 or so (AMD microcode):</p><div class="codebox"><pre><code>[    3.887181] microcode: microcode updated early to new patch_level=0x05000119
[    3.887366] microcode: CPU0: patch_level=0x05000119
[    3.887388] microcode: CPU1: patch_level=0x05000119
[    3.887403] microcode: Microcode Update Driver: v2.2.</code></pre></div>]]></description>
			<author><![CDATA[dummy@example.com (greenjeans)]]></author>
			<pubDate>Mon, 01 Sep 2025 16:29:15 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=57748#p57748</guid>
		</item>
		<item>
			<title><![CDATA[Re: amd64-microcode update for transient scheduler attacks]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=57737#p57737</link>
			<description><![CDATA[<div class="quotebox"><blockquote><div><p>Is Devuan in process of putting this update into the Daedalus repos?</p></div></blockquote></div><p>Definitely not. The Daedalus repo will only be updated if there is an update coming from the Debian repo. <br />Devuan is Debian w/o systemd, only parts that have relation to systemd are replaced or modified. </p><p>Anyhow, if I read the document correctly the main fix is an bios update.</p>]]></description>
			<author><![CDATA[dummy@example.com (rolfie)]]></author>
			<pubDate>Sun, 31 Aug 2025 19:23:31 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=57737#p57737</guid>
		</item>
		<item>
			<title><![CDATA[Re: amd64-microcode update for transient scheduler attacks]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=57736#p57736</link>
			<description><![CDATA[<p>Hello:</p><div class="quotebox"><cite>greenjeans wrote:</cite><blockquote><div><p>After installing the microcode package ...</p></div></blockquote></div><p>These are the <span class="bbu">first</span> two lines in my <span class="bbc">dmesg</span> printout:</p><div class="codebox"><pre><code>$ sudo dmesg | more
groucho@devuan:~$ sudo dmesg
[    0.000000] microcode: microcode updated early to revision 0xa0b, date = 2010-09-28
[    0.000000] Linux version 6.1.0-38-amd64 (debian-kernel@lists.debian.org) (gcc-12 (Debian 12.2.0-14+deb12u1) ...
--- snip ---
$</code></pre></div><p>ie: first the microcode and then the kernel</p><p>Further on, I get this:</p><div class="codebox"><pre><code>$ sudo dmesg | more
--- snip ---
[    0.155960] MDS: Vulnerable: Clear CPU buffers attempted, no microcode
--- snip ---
[    3.399828] microcode: sig=0x1067a, pf=0x10, revision=0xa0b
[    3.400056] microcode: Microcode Update Driver: v2.2.
--- snip ---
$ </code></pre></div><p>I also have the <span class="bbc">intel-microcode</span> package installed and the module blacklisted in <span class="bbc">/etc/modprobe.d</span>.</p><div class="codebox"><pre><code>$ apt list | grep installed | grep intel-microcode
--- snip ---
intel-microcode/stable-security,now 3.20250512.1~deb12u1 amd64 [installed]
$ </code></pre></div><p>The directory <span class="bbc">/lib/firmware/intel-ucode</span> has 125 files in it, all with a <span class="bbc">Modify time</span> = May 18 20:06, so they receive updates.</p><p>Some insight from Intel:</p><div class="quotebox"><cite>intel / Intel-Linux-Processor-Microcode-Data-Files @github.com wrote:</cite><blockquote><div><p>OS vendors may choose to provide an MCU that the kernel can consume for early loading. For example, Linux can apply an MCU very early in the kernel boot sequence. In situations where a BIOS update isn&#039;t available, early loading is the next best alternative to updating processor microcode. Microcode states are reset on a power reset, hence its required that the MCU be loaded every time during boot process.</p></div></blockquote></div><p>I&#039;d say that the module is blacklisted so that only the kernel deals with the respective microcode file at the very start of the boot process.<br />Just an edguess.</p><p>Best,</p><p>A.</p>]]></description>
			<author><![CDATA[dummy@example.com (Altoid)]]></author>
			<pubDate>Sun, 31 Aug 2025 19:06:33 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=57736#p57736</guid>
		</item>
		<item>
			<title><![CDATA[Re: amd64-microcode update for transient scheduler attacks]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=57731#p57731</link>
			<description><![CDATA[<p>Firstly, this is NOT an area in which I have great skills or knowledge, so take it with a grain of salt. It&#039;s just that I noticed something months ago and am sharing it, forgive me if it&#039;s common knowledge. I don&#039;t know if it throws a wrench into the process or not.</p><p>After installing the microcode package, it throws up a file in /etc/modprobe.d, amd64-microcode-blacklist.conf, which reads thusly:</p><div class="codebox"><pre><code># The microcode module attempts to apply a microcode update when
# it autoloads.  This is not always safe, so we block it by default.
blacklist microcode</code></pre></div><p>It does this with intel microcode as well.</p><p>I only know about that because I use that folder to blacklist wdat_wdt.</p>]]></description>
			<author><![CDATA[dummy@example.com (greenjeans)]]></author>
			<pubDate>Sun, 31 Aug 2025 16:21:22 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=57731#p57731</guid>
		</item>
		<item>
			<title><![CDATA[Re: amd64-microcode update for transient scheduler attacks]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=57713#p57713</link>
			<description><![CDATA[<p>if i&#039;m not mistake that is a firmware update, either your need to wait until your board vendor releases an update and install manually, or wait a while and check if it is going to be added to the LVFS database to update with fwupd, mind you not all OEM vendors upload every firmware and microcode updates to LVFS nor upload them in a short time from releaseing the updates, could be anything from days to even a year it all depends on how well the vendor, in this case AMD supports the Linux Vendor Firmware Service.</p><p>in my experience the support is not great not terrible, in a couple of ocassions i&#039;ve had firmware updates for my HP ProBook 445 G7 that runs on an AMD ryzen 7 4700U installable via fwupd, for many others however i&#039;ve had to install the updates from HP via the uefi update menu</p><p><a href="https://wiki.debian.org/Firmware/Updates" rel="nofollow">https://wiki.debian.org/Firmware/Updates</a></p>]]></description>
			<author><![CDATA[dummy@example.com (EDX-0)]]></author>
			<pubDate>Sun, 31 Aug 2025 01:22:51 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=57713#p57713</guid>
		</item>
		<item>
			<title><![CDATA[amd64-microcode update for transient scheduler attacks]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=57712#p57712</link>
			<description><![CDATA[<p>On an AMD Ryzen 7 5800 machine running Devuan Daedalus, I just updated to kernel 6.1.0-38-amd64 and now see a report in dmesg: &quot;Transient Scheduler Attacks: Vulnerable: Clear CPU buffers attempted, no microcode&quot;.&#160; There is a similar message in the output of lscpu.&#160; I have the amd64-microcode package installed, version 3.20240820.1~deb12u1, which was an updated version from the version initially installed in Daedalus.&#160; The fact that I got an updated version at some point after installation would seem to indicate I have apt sources set up correctly to get updates to that package.</p><p>From <a href="https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html" rel="nofollow">https://www.amd.com/en/resources/produc … -7029.html</a> it appears AMD has released a microcode update a few weeks ago.&#160; Is Devuan in process of putting this update into the Daedalus repos?</p>]]></description>
			<author><![CDATA[dummy@example.com (rmrichesjr)]]></author>
			<pubDate>Sat, 30 Aug 2025 22:41:38 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=57712#p57712</guid>
		</item>
	</channel>
</rss>
