On Thursday, 4 January 2018 09:56:44 UTC+1, stephen...@gmail.com  wrote:
> On Wednesday, 3 January 2018 12:55:54 UTC+1, stephen...@gmail.com  wrote:
> > https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/
> > 
> > http://pythonsweetness.tumblr.com/post/169166980422/the-mysterious-case-of-the-linux-page-table
> > 
> > It seems as if Linux countermeasures will involve a significant rewrite 
> > aka. FUCKWIT.
> > 
> > Is this perhaps why there is no final 4.0 release?
> 
> There is a Xen fix available here, at least to the Meltdown manifestation to 
> the chip-makers SNAFU:
> 
> https://xenbits.xen.org/xsa/advisory-254.html
> 
> This I assume will be in the 4.0 release version of Qubes.
> 
> The best explanation of the field that I can find is here: 
> https://www.theregister.co.uk/2018/01/04/intel_amd_arm_cpu_vulnerability/
> 
> Oder?

Or at least the Meltdown (= SP3?) parts thereof.  Against Spectre there is no 
known defence, which generally seems to break VM isolation against an attack.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0e64448c-b159-40c0-8a19-5c6d6bde8864%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to