The CPU 'Intel(R) Celeron(R) M processor' remains not fully mitigated and vulnerable to: itlb_multihit mds spec_store_bypass In the linked bug report (on openSUSE's bugzilla) it was discussed that the proper way to do this is through microcode. I understand that as well as that Intel is not going to do it for some CPUs. However as it seems per Intel's documentation software mitigation is possible (https://bugzilla.opensuse.org/show_bug.cgi?id=1163120#c15). Performance hit or not - if it is possible, it is correct to have it and let the user decide whether to enable it or not (e.g. through a boot flag)? There are use cases where security is more important than speed and vice versa. *Full CPU info and details available on the link.