-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, Nov 14, 2019 at 10:37:33AM -0800, Lorenzo Lamas wrote:
> Btw, do you think it is possible for Qubes to distribute the Intel
> fTPM(http://tpm.fail/) update somehow like Qubes does with microcodes?
I don't think it's directly possible, this
haaber:
> Just a small comprehension question to the microkerel update shipped in
> the last xen update: are these microkernels "flashed" into some cpu
> memory, or are they re-run / setup at each boot again? Cheers, Bernhard
>
I think you mean microcode. From what I know, the CPU starts with
Just a small comprehension question to the microkerel update shipped in
the last xen update: are these microkernels "flashed" into some cpu
memory, or are they re-run / setup at each boot again? Cheers, Bernhard
--
You received this message because you are subscribed to the Google Groups
On Thursday, November 14, 2019 at 2:57:19 PM UTC+1, Andrew David Wong wrote:
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2019-11-14 6:28 AM, Andrew David Wong wrote:
> > On 2019-11-13 12:40 PM, Lorenzo Lamas wrote:
> >> There are 2 new vulnerabilities in Intel CPU's, also
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2019-11-14 6:28 AM, Andrew David Wong wrote:
> On 2019-11-13 12:40 PM, Lorenzo Lamas wrote:
>> There are 2 new vulnerabilities in Intel CPU's, also affecting
>> Xen. Xen has issued XSA-304(CVE-2018-12207) and XSA
>> 305(CVE-2019-11135). Is the
On 11/14/19 7:28 AM, Andrew David Wong wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2019-11-13 12:40 PM, Lorenzo Lamas wrote:
There are 2 new vulnerabilities in Intel CPU's, also affecting Xen.
Xen has issued XSA-304(CVE-2018-12207) and XSA 305(CVE-2019-11135).
Is the Qubes team
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2019-11-13 12:40 PM, Lorenzo Lamas wrote:
> There are 2 new vulnerabilities in Intel CPU's, also affecting Xen.
> Xen has issued XSA-304(CVE-2018-12207) and XSA 305(CVE-2019-11135).
> Is the Qubes team aware yet? I haven't seen a new QSB.
>
Yes,