-
### Qubes OS release
4.2.2
### Brief summary
CVE-2018-3639 aka 'Variant 4, speculative store bypass' is being reported by `spectre-meltdown-checker` (#4262) with Qubes dom0 default kernel boo…
-
after [applying the ARM-recommended Spectre v4 mitigation on my Raspberry Pi 4](https://github.com/raspberrypi/firmware/issues/1451#issuecomment-671852625), I confirmed that the `spectre_v4` demo from…
-
When running on FreeBSD on powerpc64 architecture (POWER9 CPU) I get:
```
root@talos:$~/spectre-meltdown-checker-master$ ./spectre-meltdown-checker.sh -v -v
Spectre and Meltdown mitigation detectio…
-
@kostapr As of last night, a pull request https://github.com/ARM-software/arm-trusted-firmware/pull/1392 is pending upstream with mitigations for CVE-2018-3639 (new Spectre variant 4).
Please backpor…
-
I've been exploring this problem at https://answers.launchpad.net/ubuntu/+source/intel-microcode/+question/681827. It doesn't seem to be a problem on the Ubuntu side. Is this being falsely flagged?
-
spectre-meltdown-checker `v0.42`
`spectre-meltdown-checker --paranoid` on a Debian buster host: passed (exit code `0`)
`spectre-meltdown-checker --paranoid` in a Debian buster VirtaulBox VM: fai…
-
I have two CentOS 7.5 systems, both running the **3.10.0-862.11.6.el7** kernel, but one is using **microcode_ctl-2.1-29.10.el7_5.x86_64** and the other is using the newest microcode_ctl package, **mic…
-
**Describe the bug**
the Raspberry Pi 4's Cortex-A72 cores are vulnerable to Spectre v4 (Speculative Store Bypass, CVE-2018-3639). [according to ARM](https://developer.arm.com/support/arm-security-up…
-
I have a drop in hashrate with my dual AMD-CPU server. Below I answered all questions regarding my system.
When mining with old versions of xmr-stak (now and 10 month ago) I always had a hashrate a…
-
Shows CPU as vulnerable even though sysfs reports it's mitigated in microcode:
```
$ cat /sys/devices/system/cpu/vulnerabilities/srbds
Mitigation: Microcode
```
```
CVE-2020-0543 aka 'Speci…