![]() Login with username, password and session length You are Here: Linux Lite Forums » General » Security & Bug Fixes » Meltdown & Spectre Information and Discussion Linux Lite - A.I. Forum Home Help Bugs Search Bookmarks Download Donate Shop Staff Login. My Mac Mini is running UM (one of the few distros with lingering support for it) and there aren’t all that many left for 32-bit x86. Meltdown & Spectre Information and Discussion. These affect modern microprocessors that perform branch prediction and other forms of speculation. If you have any questions, feel free to reach out to me on Twitter. Spectre refers to one of the two original transient execution CPU vulnerabilities (the other being Meltdown ), which involve microarchitectural timing side-channel attacks. I hope this article shed some light on what the Chrome and V8 teams are doing to keep the web platform safe, and how web developers can help by using existing security features. Watch Dolphin Oracles videos and forum member Bitjam (an antiX / MX dev who works on live boot and other stuff) is very responsive on the antiX and MX forums. There has been a lot of uncertainty around the discovery of Spectre and Meltdown and their implications. ![]() BTW, the advanced live boot features of antiX and MX are unmatched (resulting in incredibly fast boot times into a persistent system), but some of the many options and tools can be very complex and difficult to learn. The developer of the Ubuntu-based Linux Lite distribution has created a script that makes it easier for Linux users to check if their systems are vulnerable to the Meltdown and Spectre security flaws. Thus I consider Point to be in the lead but I liked MX’s features and communitry support and settled on it for my 32-bit Atom netbook several months ago after also trying antiX on it. I don’t really count IPFire in lead position though, because it’s not a complete desktop (or even server) distro. spectre-meltdown-checker.sh is a simple shell script to find out if your Linux kernel (installation) is vulnerable against the 3 speculative execution CVEs. Since Linux Kernel 4.17, administrators can disable all mitigations for Spectre v4 (CVE-2018-3639) with the 'nospecstorebypassdisable' command line parameter. Well so it is, but both Slackware in the #3 spot and MX at #4 share a user review average of 9.63, ATM so I’d say they are tied for 3rd. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |