![]() ![]() Minipli is an unofficial fork of the former grsecurity patches (original grsecurity is no longer publiclyĪvailable). Explanation of PCID, which will reduce performance impact of KPTI on newer kernels.Comment by kernel developer Andrew Lutomirski that pre-4.14 kernels got an earlier version of KPTI and may contain bugs.Longterm support kernels Version 4.9.75 and 4.4.110 contain KPTI backports.Is a mitigation in the Linux Kernel, originally named KAISER. ![]() Dag-Erling Smørgrav published a Meltdown PoC for FreeBSD.The LSDS group at Imperial College London has published sample code demonstrating a Spectre-like attack against an Intel SGX enclave.In a recent tweet, Jann Horn (Google's Project Zero) has announced that the PoC code referenced in their recent blogpost about CPUs is now public.In a recent tweet, Moritz Lipp (Graz University of Technology) has announced the release of their PoC implementations for Meltdown.Microsoft Windows: See the Windows section in this document containing the link to the official Powershell script.Linux: Debian Spectre-Meltdown Checker - Spectre & Meltdown vulnerability/mitigation checker available in stretch-backports.Linux: Red Hat Check Script - get the latest version from the diagnose tab of the main Red Hat vulnerability article.Linux: Stéphane Lesimple put together a simple shell script to tell if your Linux installation is vulnerable against the 3 "speculative execution" CVEs.If you have better info please send pull requests. This willĬhange rapidly and may contain errors. I'm collecting notes on the patch status in various software products. The bug is in the hardware, but mitigations in operating systems are possible and are getting or (both pages serve identical content).Meltdown and Spectre are hardware design vulnerabilities in all modern CPUs based on Summary of the patch status for Meltdown / Spectre What? ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |