2018-05-23 16:57 GMT+02:00 Sandro Bonazzola :
> As you may have already heard, an industry-wide issue was found in the way
> many modern microprocessor designs have implemented speculative execution
> of Load & Store instructions.
> This issue is well described by
On Thu, May 24, 2018 at 10:08 AM, Michal Skrivanek <
michal.skriva...@redhat.com> wrote:
[snip]
> >
> > Intel has been promising microcode updates since January when Spectre
> first appeared and yet except for the very newest CPUs we haven't seen
> anything and in the cases of older CPUs, I
> On 23 May 2018, at 18:45, WK wrote:
>
>
>
> On 5/23/2018 7:57 AM, Sandro Bonazzola wrote:
>>
>>
>> Please note that to fully mitigate this vulnerability, system administrators
>> must apply both hardware “microcode” updates and software patches that
>> enable new
2018-05-23 18:45 GMT+02:00 WK :
>
>
> On 5/23/2018 7:57 AM, Sandro Bonazzola wrote:
>
>>
>>
>> Please note that to fully mitigate this vulnerability, system
>> administrators must apply both hardware “microcode” updates and software
>> patches that enable new functionality.
>>
On 5/23/2018 7:57 AM, Sandro Bonazzola wrote:
Please note that to fully mitigate this vulnerability, system
administrators must apply both hardware “microcode” updates and
software patches that enable new functionality.
At this time, microprocessor microcode will be delivered by the
5 matches
Mail list logo