Date: Sat, 13 Jan 2018 16:50:01 -0500 From: Baho Utot <baho-utot@columbus.rr.com> To: freebsd-questions@freebsd.org Subject: =?UTF-8?Q?Re:_Meltdown_=e2=80=93_Spectre?= Message-ID: <830b54da-cf10-b58a-f882-e0532d5db4ed@columbus.rr.com> In-Reply-To: <20180113202401.0b4f90c0@archlinux.localdomain> References: <20180113125406.285bf5cb@archlinux.localdomain> <jEBK5og2bKIEwn0efgqn1_emp5J8cnU6eWDXTIg1KBCtGpeca4BJG5sNHiJ3PBRGcFY6NsY5E3-y6NsUIjlIMQzAqI9b20Y0l0zqEhEXT9I=@protonmail.ch> <CAMp1EbVkcSwbgXWCC%2B_FT3S5_3mi9dzdZiRPLJh=Brxzgq7rDg@mail.gmail.com> <20180113202401.0b4f90c0@archlinux.localdomain>
next in thread | previous in thread | raw e-mail | index | archive | help
On 1/13/2018 2:24 PM, Ralf Mardorf wrote: > On Sat, 13 Jan 2018 15:29:27 +0000, Pablo Fernandez wrote: >> El sáb., 13 ene. 2018 13:58, Thomas Pfundt escribió: >>> However, this site doesn't list your Celeron G as vulnerable: >>> https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr >>> Do you even need to concern with the patch and performance at this >>> point? > > That is interesting news. I'll forward this, since actually it's > claimed that all x86 CPUs since the Pentium Pro from 1995 suffer from > this issue. > > Does anybody know how to value this information from Intel? It not worth much on the open market since it is readily available from the intels site. ou will not get rich from selling this information
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?830b54da-cf10-b58a-f882-e0532d5db4ed>