On 02/20/2018 12:39 AM, Ed Greshko wrote:
On 02/20/18 15:51, Paul Allen Newell wrote:
In earlier email in this thread, you stated:
Yes. As long as you don't have kernel modules which were built with a
non-patched gcc.
ls /sys/devices/system/cpu/vulnerabilities/*
cat
On 02/20/18 15:51, Paul Allen Newell wrote:
> In earlier email in this thread, you stated:
>
> Yes. As long as you don't have kernel modules which were built with a
> non-patched gcc.
>
> ls /sys/devices/system/cpu/vulnerabilities/*
>
> cat
On 02/19/2018 06:04 AM, Ed Greshko wrote:
On 02/19/18 21:51, Ranjan Maitra wrote:
What do these mean, and what is the needed mitigation, if any?
Basically, it means that everything that can currently be done to lessen the
chances
of a security breach is being done.
Otherwise you may see
On Mon, 19 Feb 2018 22:04:41 +0800 Ed Greshko wrote:
> On 02/19/18 21:51, Ranjan Maitra wrote:
> > What do these mean, and what is the needed mitigation, if any?
>
>
> Basically, it means that everything that can currently be done to lessen the
> chances
> of a
On 02/19/18 21:51, Ranjan Maitra wrote:
> What do these mean, and what is the needed mitigation, if any?
Basically, it means that everything that can currently be done to lessen the
chances
of a security breach is being done.
Otherwise you may see something like...
Mitigation: Full generic
Mine are stock Fedora kernels, updated to the latest.
On Mon, 19 Feb 2018 21:44:09 +0800 Ed Greshko wrote:
> On 02/19/18 20:14, Turritopsis Dohrnii Teo En Ming wrote:
> > What are the patches that I can download and install to be protected
> > against the Meltdown and
On 02/19/18 20:14, Turritopsis Dohrnii Teo En Ming wrote:
> What are the patches that I can download and install to be protected
> against the Meltdown and Spectre security vulnerabilities?
(Resend to List, oops)
Yes. As long as you don't have kernel modules which were built with a
non-patched