05.01.2018, 10:16, "Yves-Alexis Perez" <[email protected]>: > On Fri, 2018-01-05 at 10:07 +0300, Ozgur wrote: >> I talked yesterday Debian kernel team and was a work on Debian kernel for >> the latest stable, I think all users add to "x86_64_BUG_CPU_INSECURE" >> parameter .config file and add "= y" added and recompiled. > > Hi Ozgur,
Hello Alexis, thanks for reply and I'm using the stable version (Debian stretch). I updated last night and I don't seen any new kernel patch yet. sources.list: deb http://security.debian.org/debian-security stretch/updates main contrib non-free deb-src http://security.debian.org/debian-security stretch/updates main contrib non-free deb http://deb.debian.org/debian/ stretch-updates main contrib non-free deb-src http://deb.debian.org/debian/ stretch-updates main contrib non-free deb http://deb.debian.org/debian/ stretch main contrib non-free deb-src http://deb.debian.org/debian/ stretch main contrib non-free $ uname -ar Linux laptop.debian.local 4.9.0-5-amd64 #1 SMP Debian 4.9.65-3+deb9u2 (2018-01-04) x86_64 GNU/Linux Regards Ozgur > that's completely irrelevant. For Meltdown fix on Stretch/amd64, please > upgrade to the just published linux-image-4.9.0-5-amd64 version > 4.9.65-3+deb9u2. > > Regards, > -- > Yves-Alexis

