Intel lmao

NO THIS CANNOT BE HAPPENING I WAS PATCHED I WAS PATCHED WHY AM I STILL VULNERABLE

Attached: Screenshot_20180326_111809.png (1914x932, 247K)

Other urls found in this thread:

github.com/speed47/spectre-meltdown-checker
twitter.com/NSFWRedditImage

all modern cpus, even arm64 are vulnerable to spectre

are u trusting a company? even more, trusting intel?
why are u here normie?

>'NVIDIA' taints kernel

Lmao

C programmers are the cancer of this earth
we need a system that is completely typesafe from the ground up

back into stupid whore tech illiterate attention seeking human waste

for penis in /sys/devices/system/cpu/vulnerabilities/*; do echo "$(basename $penis): $(cat $penis)"; done;
meltdown: Not affected
spectre_v1: Mitigation: __user pointer sanitization
spectre_v2: Mitigation: Full AMD retpoline

Attached: 1509744679083.png (1038x1000, 184K)

kys degenerate you contribute nothing to this board

dumbass inturd shill

Is there already a fix for ryzen 7 cpus ?

AGESA 1.0.0.1a

Lol , many mobos including the crosshairs does not have an update yet

Have you ever posted proof you're a female?

As the spectre paper states, spectre has been verified on intel and arm cpus but not on amd.
They assume that amd is vulnerable to spectre.
That's not exactly what I call research

Don't worry. You don't have anything anyone wants to steal anyway.

Femanon LARPshitter BTFO

amd64 is the instruction set that Intel uses as well.

>RyzenFall

You do realize that you simply can't fix these vulnerabilities?
You can only make it harder for the attacker. There is no >FIX

>will be fixed within a few days
wow it's fucking nothing

So what? This has nothing to do with the ISA.

I don't has firmware update yet.
Got some retpoline tho.
Last I read about it, like over a month ago, amd was theoretically vulnerable to variant 2, but it still hadn't been actually done yet, as far as any white hats knew.
AMD states they were never vuln to variant 3.

Attached: CopyQ.L11111.png (818x709, 148K)

What software are you using for that info?

>Not real

This exploit is a nothing burger. So it can read some RAM at extremely low speed, whoop de fucking doo.

github.com/speed47/spectre-meltdown-checker

Is this the one that sideloads a bitcoin miner that half of Sup Forums fell for?

Some early Atom's are AMD64 as well and they aren't vulnerable

Spectre and Meltdown have nothing to do with type safety dumb Rust shill

shut the fuck up if you don't know what the fuck you're talking about, redditshit

idk it's 1 fucking script so why don't you read it & check

>Nothing burger

>I WAS PATCHED I WAS PATCHED
LOL
>WHY AM I STILL VULNERABLE
Time to go off the deep end. The Spectre and Meltdown exploits are not exploits. Someone that wasn't supposed to access Management Engine (and whatever AMD's equivalent is) got in and now shit's fukt.

Should I be afraid Sup Forums?

Attached: Screenshot from 2018-03-26 22-05-33.png (715x662, 152K)

the IME and AMD PSP are not relevant at all in this
its the speculative preexecution environment

those are a separate problem

don't be that guy that thinks they know shit