-
Possibly similar to #302 and #310, I get:
# output
user@host:~$ sudo /usr/bin/spectre-meltdown-checker --version
Spectre and Meltdown mitigation detection tool v0.43
**selective copypasta from o…
-
When running on FreeBSD on powerpc64 architecture (POWER9 CPU) I get:
```
root@talos:$~/spectre-meltdown-checker-master$ ./spectre-meltdown-checker.sh -v -v
Spectre and Meltdown mitigation detectio…
-
spectre-meltdown-checker `v0.42`
`spectre-meltdown-checker --paranoid` on a Debian buster host: passed (exit code `0`)
`spectre-meltdown-checker --paranoid` in a Debian buster VirtaulBox VM: fai…
-
I've been exploring this problem at https://answers.launchpad.net/ubuntu/+source/intel-microcode/+question/681827. It doesn't seem to be a problem on the Ubuntu side. Is this being falsely flagged?
-
I have two CentOS 7.5 systems, both running the **3.10.0-862.11.6.el7** kernel, but one is using **microcode_ctl-2.1-29.10.el7_5.x86_64** and the other is using the newest microcode_ctl package, **mic…
-
I have a drop in hashrate with my dual AMD-CPU server. Below I answered all questions regarding my system.
When mining with old versions of xmr-stak (now and 10 month ago) I always had a hashrate a…
-
Shows CPU as vulnerable even though sysfs reports it's mitigated in microcode:
```
$ cat /sys/devices/system/cpu/vulnerabilities/srbds
Mitigation: Microcode
```
```
CVE-2020-0543 aka 'Speci…
-
Critical vulnerabilities in Docker image phpmyadmin:5.1.1
Maybe you should add a "vulnerability bot" or something to check that periodically.
https://github.com/anchore/grype
```
grype phpm…
-
### Qubes OS version:
R4
### Affected component(s):
probably any Debian based TemplateVM (debian-9 tested by me), Whonix 14 (tested by me)
not affected: Fedora
---
### Steps to reproduc…
-
The custom workstation update process described in freedomofpress/securedrop-workstation#24 has now been largely superseded by the `qubes-gui-updater` tool in dom0. See screenshot:
![qubes-gui-upda…