![]() |
Meltdown & Spectre Information and Discussion - Printable Version +- Linux Lite Forums (https://www.linuxliteos.com/forums) +-- Forum: General (https://www.linuxliteos.com/forums/forumdisplay.php?fid=4) +--- Forum: Security & Bug Fixes (https://www.linuxliteos.com/forums/forumdisplay.php?fid=16) +--- Thread: Meltdown & Spectre Information and Discussion (/showthread.php?tid=4813) |
Re: Meltdown & Spectre Information and Discussion - trinidad - 01-31-2018 I will try this out sometime this week Jerry. Thanks. TC Re: Meltdown & Spectre Information and Discussion - Moltke - 01-31-2018 Here's another nice article I just found on the web, it describes another way to check on meltdown-spectre http://kroah.com/log/blog/2018/01/19/meltdown-status-2/ ![]() Re: Meltdown & Spectre Information and Discussion - trinidad - 02-06-2018 Bad news is that now more than 200 different forms of malware have turned up in the "wild" modified to attempt to exploit the Spectre vulnerability, which indicates the probability that some sophisticated sleeper applications may evolve to pose a huge threat to Microsoft Windows. Good news is that this week I will be posting several different alternative ways to monitor for the vulnerabilities besides the already available spectre-meltdown-checker. Debian has now backported the spectre-meltdown-checker for stretch. TC Re: Meltdown & Spectre Information and Discussion - TheDead - 02-06-2018 "Once its weaponized to run evil things, we're doomed, DOOMED! Dooooooomed! ![]() We'll need Coconut computers! Re: Meltdown & Spectre Information and Discussion - ian_r_h - 02-07-2018 Hmmm... off to live in a cave in the middle of a forest (next to a river with plenty of fish)... ![]() Will launch my secret nuclear weapons at Intel first... Re: Meltdown & Spectre Information and Discussion - supergamer - 02-08-2018 It seems the new kernel 4.13.33 fixes the variant 2 version on an older amd at least. Re: Meltdown & Spectre Information and Discussion - Moltke - 02-08-2018 (02-08-2018, 02:03 PM)supergamer link Wrote: It seems the new kernel 4.13.33 fixes the variant 2 version on an older amd at least. I'm using latest kernel 4.15 on an AMD CPU too and I see this message on boot I can't just now remember. However, running Code: $ grep . /sys/devices/system/cpu/vulnerabilities/* shows this: Code: /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected I believe message on boot has something to do with last line of that output; full generic reptoline. Re: Meltdown & Spectre Information and Discussion - supergamer - 02-08-2018 I used the script to check. Here is the report from your command: Code: /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected Re: Meltdown & Spectre Information and Discussion - The Repairman - 02-09-2018 8) Re: Meltdown & Spectre Information and Discussion - supergamer - 02-09-2018 I'm running a highly modified version of Linux Lite and some modified Xubuntu stuff. I am assuming the kernel updates will be pushed out by Ubuntu as that is how I got them as I am running a HWE kernel. Code: System: Host: supergamer Kernel: 4.13.0-33-generic x86_64 (64 bit gcc: 5.4.0) |