https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100444

--- Comment #7 from Edward Cree <ecree429 at virginmedia dot com> ---
(In reply to Richard Biener from comment #4)
> people that
> cannot be bothered to update their ucode or the kernel are not likely
> bothered to update libstdc++ either.

Fwiw, my kernel is fairly up-to-date (5.9.0-3-amd64); it and my libstdc++ get
updates pretty regularly from the distro, whereas (like most normal folks) I
don't tend to reflash my BIOS without a good reason.  (Which this is, I grant
you, but I only found out recently that it was causing me any issues, and I'm
holding off on the update in case affected projects want me to test mitigations
/ run additional experiments on the buggy hw.)  And while Debian can apply
updated ucode at boot-time, it's not enabled by default because the ucode
binaries are non-free.

So a user of a freedom-respecting OS, following normal routine update
procedures, will automatically get libstdc++ updates but not ucode updates.

But if, having considered it, you decide it's not worth it for libstdc++ to
mitigate this, that's fine by me — after all, now that I know about the issue,
I can fix my system.  Question is whether you want to try to protect other
users from hitting the same thing.

Reply via email to