-
Source: QUALYS
Finding Description: CentOS has released security update for kernel to fix the vulnerabilities.
Affected Product: centos 6
Impact: An unprivileged attacker could use this flaw to cros…
-
Chrome is reported as patched against both Spectre and Meltdown. Results of running checker in
in developer shell listed below. This is a vanilla machine w/ dev mode enabled specifically to run c…
-
When running on FreeBSD on powerpc64 architecture (POWER9 CPU) I get:
```
root@talos:$~/spectre-meltdown-checker-master$ ./spectre-meltdown-checker.sh -v -v
Spectre and Meltdown mitigation detectio…
-
I've been exploring this problem at https://answers.launchpad.net/ubuntu/+source/intel-microcode/+question/681827. It doesn't seem to be a problem on the Ubuntu side. Is this being falsely flagged?
-
Shows CPU as vulnerable even though sysfs reports it's mitigated in microcode:
```
$ cat /sys/devices/system/cpu/vulnerabilities/srbds
Mitigation: Microcode
```
```
CVE-2020-0543 aka 'Speci…
-
I have a drop in hashrate with my dual AMD-CPU server. Below I answered all questions regarding my system.
When mining with old versions of xmr-stak (now and 10 month ago) I always had a hashrate a…
-
### Qubes OS version:
R4
### Affected component(s):
probably any Debian based TemplateVM (debian-9 tested by me), Whonix 14 (tested by me)
not affected: Fedora
---
### Steps to reproduc…
-
How to reproduce:
```
$ vagrant init ubuntu/xenial64
$ vagrant up
[ install agent ]
```
You will then get:
Reproduced on macOS 10.15.1 and VirtualBox 6.0.14 r133895 (Qt5.6.3)
-
w.r.t. https://github.com/CWE-CAPEC/hw-cwe-sig/pull/5
The [current proposal](https://github.com/CWE-CAPEC/hw-cwe-sig/blob/a8e441793bc4d53eb4df44f0ac8a2f1887614efa/working-docs/transient.md) has two…
-
The custom workstation update process described in freedomofpress/securedrop-workstation#24 has now been largely superseded by the `qubes-gui-updater` tool in dom0. See screenshot:
![qubes-gui-upda…