Yet another spectre class vulnerability

access.redhat.com/security/vulnerabilities/ssbd

Other urls found in this thread:

bugs.chromium.org/p/project-zero/issues/detail?id=1528
redhat.com/en/blog/speculative-store-bypass-explained-what-it-how-it-works
blogs.technet.microsoft.com/srd/2018/05/21/analysis-and-mitigation-of-speculative-store-bypass-cve-2018-3639/
youtube.com/watch?v=HHgxOXEQaFU
en.wikipedia.org/wiki/Zilog_eZ80
twitter.com/SFWRedditGifs

The bug itself being discussed here

bugs.chromium.org/p/project-zero/issues/detail?id=1528

are known.

Since OP is obviously a faggot and can't even write a proper writeup:

>CVE-2018-3640 – Rogue System Register Read (RSRE) – also known as Variant 3a

>CVE-2018-3639 – Speculative Store Bypass (SSB) – also known as Variant 4

redhat.com/en/blog/speculative-store-bypass-explained-what-it-how-it-works
blogs.technet.microsoft.com/srd/2018/05/21/analysis-and-mitigation-of-speculative-store-bypass-cve-2018-3639/
Intel's response:
youtube.com/watch?v=HHgxOXEQaFU

Just use TempleOS, bro. It is only OS that was not affected by those spectre/meltdown vulnerabilities.

Attached: Atari_1040STf.jpg (500x354 2.22 MB, 1023.97K)

If the M86k and 65xx series continued its not unreasonable to assume they would also be effected by these same bugs

I don't know if those chips are still used, but Z80 is and it doesn't have all these problems.
en.wikipedia.org/wiki/Zilog_eZ80

Boy, I sure am glad I spent $4k on a secure (((Talos))) workstation

Does this affect Xburst MIPS shit like the MIPS Creator? I'm assuming not as I've never heard of MIPS anything with out of order execution.

Do they even have virtual memory? Can Linux be used on them? Why don't we have 68k distros then?

Attached: intelceo.jpeg (1024x629, 71.23K)

POWER9 isn't open at all. the spec's are behind a $100,000/year paywall and NDA.

Fuck.
These vulnerabilities are just going to keep piling up, aren't they? I can't wait until all the necessaty security and firmware patches reduce the performance of some $100,000 Xeon to the level of an Intel 4004.

Attached: 9c56fe99346d95087ad85e24d4f7b50b15799c40469c092b79e958a799cdac89-v.gif (500x710, 36.11K)

Not the Z80, it's a simple 8-bit CPU. Very good for embedded stuff, and nice for simple computers and game consoles.
But m68k can and did run Unix. That chip was even used in NeXT and Sun workstations, and also pic. There used to be Linux and BSD ports for m68k-based computers. NetBSD might even still work on them.

Attached: pub-amiga3000ux-svr4.jpg (847x1105, 208.19K)

It can run CP/M, which is open source too nowadays.
Considering how the "fixes" for all these vulnerabilities involve performance hits, it might be a good idea to start getting used to it again.

The beauty of tomorrow is that security is nonexistent and worms will no longer be made of just one exploit but dozen all cooperating.

A beautiful dystopia where nobody can hide any information and only truth can be found easily.

I jerked off when I heard of those guys that found real name of Satoshi Nakamoto

Boy I'm glad I don't shill (((Intel))) 4free

NetBSD has a working and up to date Dreamcast port, of course it's probably still got one for a general purpose machine.

All the more reason to go full tinfoil.

Say what you want about the SJW RPi, but it's immune to all of the current and future Spectre and Meltdown vulnerabilites.

The RPi is also way faster than some old Intel 386 collecting dust in a basement.

it's in the hardware you dinghole

With VideoCore being publicly undocumented, you can't be sure.

...

A new hardware vulnerability is found every day, i don't give a fuck anymore.

Attached: 1514178164712.png (500x347, 121.08K)

intel-pkg update
intel-pkg upgrade

Attached: signs2.png (986x1278, 543.47K)