ridl icon indicating copy to clipboard operation
ridl copied to clipboard

Windows/L1TF: SMT reported vulnerable when no SMT is present

Open matsimon opened this issue 6 years ago • 3 comments

Hi

Using the Windows binary on Windows 7 with an Intel Core i5-4570 (4 cores, no SMT) in the L1TF section SMT is being reported as vulnerable. Yet in the section about MDS SMT is reported as Unaffected. - The first look result looks erroneous to me - correct?

It looks like it boils down to: https://github.com/vusec/ridl/blob/508d549341d785afc59681ed3f219ef72437d637/source/msw/l1tf.c#L42

Also commit 2e13baf4e7c24e38e76b38bd36f132e54b11854d added the use of the function check_smt() for l1tf.c on Linux and macOS but not Windows.

Is check_smt() not available for Windows (yet) or was it forgotten to be added in the process?

Regards Mathieu

matsimon avatar May 21 '19 09:05 matsimon

Thanks, seems I forgot to implement that. It's been fixed in 7e4fc989fd24f9066bf92f5cd43df7493ae45e8c. I will rebuild the binaries for Microsoft Windows soon.

StephanvanSchaik avatar May 21 '19 14:05 StephanvanSchaik

Thanks for the update, I'll give a test-drive ony my machine, likely by the end of the week if I see new binaries and give feedback.

matsimon avatar May 21 '19 14:05 matsimon

Any update on these new binaries.. ?

mirh avatar Nov 03 '19 12:11 mirh