NO THIS CANNOT BE HAPPENING I WAS PATCHED I WAS PATCHED WHY AM I STILL VULNERABLE
Intel lmao
Other urls found in this thread:
github.com
twitter.com
all modern cpus, even arm64 are vulnerable to spectre
are u trusting a company? even more, trusting intel?
why are u here normie?
>'NVIDIA' taints kernel
Lmao
C programmers are the cancer of this earth
we need a system that is completely typesafe from the ground up
back into stupid whore tech illiterate attention seeking human waste
for penis in /sys/devices/system/cpu/vulnerabilities/*; do echo "$(basename $penis): $(cat $penis)"; done;
meltdown: Not affected
spectre_v1: Mitigation: __user pointer sanitization
spectre_v2: Mitigation: Full AMD retpoline
kys degenerate you contribute nothing to this board
dumbass inturd shill
Is there already a fix for ryzen 7 cpus ?
AGESA 1.0.0.1a
Lol , many mobos including the crosshairs does not have an update yet
Have you ever posted proof you're a female?
As the spectre paper states, spectre has been verified on intel and arm cpus but not on amd.
They assume that amd is vulnerable to spectre.
That's not exactly what I call research
Don't worry. You don't have anything anyone wants to steal anyway.
Femanon LARPshitter BTFO
amd64 is the instruction set that Intel uses as well.
>RyzenFall
You do realize that you simply can't fix these vulnerabilities?
You can only make it harder for the attacker. There is no >FIX
>will be fixed within a few days
wow it's fucking nothing
So what? This has nothing to do with the ISA.
I don't has firmware update yet.
Got some retpoline tho.
Last I read about it, like over a month ago, amd was theoretically vulnerable to variant 2, but it still hadn't been actually done yet, as far as any white hats knew.
AMD states they were never vuln to variant 3.
What software are you using for that info?
>Not real
This exploit is a nothing burger. So it can read some RAM at extremely low speed, whoop de fucking doo.
Is this the one that sideloads a bitcoin miner that half of Sup Forums fell for?
Some early Atom's are AMD64 as well and they aren't vulnerable
Spectre and Meltdown have nothing to do with type safety dumb Rust shill
shut the fuck up if you don't know what the fuck you're talking about, redditshit
idk it's 1 fucking script so why don't you read it & check
>Nothing burger
>I WAS PATCHED I WAS PATCHED
LOL
>WHY AM I STILL VULNERABLE
Time to go off the deep end. The Spectre and Meltdown exploits are not exploits. Someone that wasn't supposed to access Management Engine (and whatever AMD's equivalent is) got in and now shit's fukt.
Should I be afraid Sup Forums?
the IME and AMD PSP are not relevant at all in this
its the speculative preexecution environment
those are a separate problem
don't be that guy that thinks they know shit