Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 13 Jan 2018 16:50:01 -0500
From:      Baho Utot <baho-utot@columbus.rr.com>
To:        freebsd-questions@freebsd.org
Subject:   =?UTF-8?Q?Re:_Meltdown_=e2=80=93_Spectre?=
Message-ID:  <830b54da-cf10-b58a-f882-e0532d5db4ed@columbus.rr.com>
In-Reply-To: <20180113202401.0b4f90c0@archlinux.localdomain>
References:  <20180113125406.285bf5cb@archlinux.localdomain> <jEBK5og2bKIEwn0efgqn1_emp5J8cnU6eWDXTIg1KBCtGpeca4BJG5sNHiJ3PBRGcFY6NsY5E3-y6NsUIjlIMQzAqI9b20Y0l0zqEhEXT9I=@protonmail.ch> <CAMp1EbVkcSwbgXWCC+_FT3S5_3mi9dzdZiRPLJh=Brxzgq7rDg@mail.gmail.com> <20180113202401.0b4f90c0@archlinux.localdomain>

Next in thread | Previous in thread | Raw E-Mail | Index | Archive | Help


On 1/13/2018 2:24 PM, Ralf Mardorf wrote:
> On Sat, 13 Jan 2018 15:29:27 +0000, Pablo Fernandez wrote:
>> El sáb., 13 ene. 2018 13:58, Thomas Pfundt escribió:
>>> However, this site doesn't list your Celeron G as vulnerable:
>>> https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
>>> Do you even need to concern with the patch and performance at this
>>> point?
> 
> That is interesting news. I'll forward this, since actually it's
> claimed that all x86 CPUs since the Pentium Pro from 1995 suffer from
> this issue.
> 
> Does anybody know how to value this information from Intel?


It not worth much on the open market since it is readily available from 
the intels site.  ou will not get rich from selling this information



Want to link to this message? Use this URL: <http://docs.FreeBSD.org/cgi/mid.cgi?830b54da-cf10-b58a-f882-e0532d5db4ed>