05.01.2018, 10:16, "Yves-Alexis Perez" <cor...@debian.org>:
> On Fri, 2018-01-05 at 10:07 +0300, Ozgur wrote:
>>  I talked yesterday Debian kernel team and was a work on Debian kernel for
>>  the latest stable, I think all users add to "x86_64_BUG_CPU_INSECURE"
>>  parameter .config file and add "= y" added and recompiled.
>
> Hi Ozgur,

Hello Alexis,

thanks for reply and I'm using the stable version (Debian stretch). I updated 
last night and I don't seen any new kernel patch yet.

sources.list:

deb http://security.debian.org/debian-security stretch/updates main contrib 
non-free
deb-src http://security.debian.org/debian-security stretch/updates main contrib 
non-free

deb http://deb.debian.org/debian/ stretch-updates main contrib non-free
deb-src http://deb.debian.org/debian/ stretch-updates main contrib non-free

deb http://deb.debian.org/debian/ stretch main contrib non-free
deb-src http://deb.debian.org/debian/ stretch main contrib non-free

$ uname -ar
Linux laptop.debian.local 4.9.0-5-amd64 #1 SMP Debian 4.9.65-3+deb9u2 
(2018-01-04) x86_64 GNU/Linux

Regards

Ozgur

> that's completely irrelevant. For Meltdown fix on Stretch/amd64, please
> upgrade to the just published linux-image-4.9.0-5-amd64 version 
> 4.9.65-3+deb9u2.
>
> Regards,
> --
> Yves-Alexis

Reply via email to