-
**Qubes OS version**
R4.0
**Affected component(s) or functionality**
Xen, dom0, domU
**Brief summary**
[https://mdsattacks.com/](https://mdsattacks.com/)
They provide a tool to check…
esote updated
5 years ago
-
This is a Qubes policy question. Not much of a technical question.
This is the state in Whonix stable-proposed-updates and testers repository:
When sys-whonix (or other whonix-gw-14 based VM) st…
-
Currently, [Google cloud](https://cloud.google.com/blog/products/identity-security/advancing-confidential-computing-with-asylo-and-the-confidential-computing-challenge) and [Azure](https://youtu.be/Qu…
-
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/Variant4
https://access.redhat.com/security/vulnerabilities/ssbd
>Red Hat has been made aware of a vulnerability that exists in modern microprocess…
-
I noticed thatXCP-ng 7.6 (dom0) with the latest updates installed is still _very_ vulnerable to several serious CVEs:
```
# ./spectre-meltdown-checker.sh --explain
Spectre and Meltdown mitigatio…
-
On ArchLinux at the time of this writing, we are running the latest version of Intel's published microcode.
https://downloadcenter.intel.com/search?keyword=processor+microcode+data+file
Dated: 8/7…
-
Hi;
## I try to understand if my system is vulnerable or not
When I'm running your tool `spectre-meltdown-checker.sh`
on a debian stretch via the kernel `Debian 4.9.110-3+deb9u5`
it say I'm vu…
-
```
$ spectre-meltdown-checker --batch nrpe
IBPB is considered as a good addition to retpoline for Variant 2 mitigation, but your CPU microcode doesn't support it
Vulnerable: CVE-2018-3640 CVE-2018…
-
My host system reports:
```
CVE-2018-3640 [rogue system register read] aka 'Variant 3a'
* CPU microcode mitigates the vulnerability: YES
> STATUS: NOT VULNERABLE (your CPU microcode mitigate…
-
Hi,
My LENOVO ThinkPad T430s had the whitelist patch installed when I had the "G7ETB1WW (2.71 )" release. Recently I did the security bios update "G7ETB2WW (2.72 )"
**Question:**
Do I need to…