I'm running Debian Buster (10.3) on a ThinkPad T420 (i5-2520M), current intel-microcode package is installed. To check for known CPU vulnerabilities I used the spectre-meltdown-checker script (https://github.com/speed47/spectre-meltdown-checker) which resulted in this output:
According to the script all CVEs related to the Microarchitectural Data Sampling (MDS) vulnerability (which are specified in The Linux kernel user’s and administrator’s guide at: https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html) are fixed on my system.
What makes me think is that cat /sys/devices/system/cpu/vulnerabilities/mds leads to Mitigation: Clear CPU buffers; SMT vulnerable which means that "The processor is vulnerable and the CPU buffer clearing mitigation is enabled." and "SMT is enabled".
How should the outputs of the tools be interpreted, or better asked, which tool can I trust?

