最后活跃于 6 months ago

waja 修订了这个 Gist 8 years ago. 转到此修订

1 file changed, 1 insertion

spectre_meltdown.md

@@ -1,6 +1,7 @@
1 1 * [Meltdown and Spectre - Vulnerabilities in modern computers leak passwords and sensitive data.](https://spectreattack.com/)
2 2 * [Project Zero team at Google: Reading privileged memory with a side-channel](https://googleprojectzero.blogspot.de/2018/01/reading-privileged-memory-with-side.html)
3 3 * [xorlgr - Thoughts on Meltdown & Spectre](https://xorl.wordpress.com/2018/01/10/thoughts-on-meltdown-spectre/)
4 + * [BSI: Prozessor-Schwachstellen: Spectre und Meltdown](https://www.bsi-fuer-buerger.de/BSIFB/DE/Service/Aktuell/Informationen/Artikel/Meltdown_Spectre_Sicherheitsluecke_10012018.html)
4 5
5 6 ## Desktop
6 7

waja 修订了这个 Gist 8 years ago. 转到此修订

1 file changed, 8 insertions

spectre_meltdown.md

@@ -33,6 +33,10 @@
33 33 * 10.3.2: https://support.apple.com/de-de/HT208331
34 34 * 10.3.2: https://support.apple.com/en-us/HT208397
35 35
36 + ### Android
37 +
38 + * [Meltdown and Spectre updates](https://9to5google.com/2018/01/10/meltdown-spectre-android-updates/)
39 +
36 40 ## Servers / Cloud
37 41
38 42 * [Meltdown and Spectre kernel update per operating system](https://docs.ovh.com/fr/dedicated/meltdown-spectre-kernel-update-per-operating-system/)
@@ -49,6 +53,10 @@
49 53
50 54 * [Microsoft: Guidance to mitigate speculative execution side-channel vulnerabilities](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002)
51 55
56 + ### Ubuntu
57 +
58 + * [Information Leak via speculative execution side channel attacks](https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown)
59 +
52 60 ## Random Links
53 61
54 62 * [Known bugs sitting in upstream LTS kernels](https://news.ycombinator.com/item?id=16087736)

waja 修订了这个 Gist 8 years ago. 转到此修订

1 file changed, 1 insertion, 1 deletion

spectre_meltdown.md

@@ -1,6 +1,6 @@
1 1 * [Meltdown and Spectre - Vulnerabilities in modern computers leak passwords and sensitive data.](https://spectreattack.com/)
2 2 * [Project Zero team at Google: Reading privileged memory with a side-channel](https://googleprojectzero.blogspot.de/2018/01/reading-privileged-memory-with-side.html)
3 - * [Thoughts on Meltdown & Spectre](https://xorl.wordpress.com/2018/01/10/thoughts-on-meltdown-spectre/)
3 + * [xorlgr - Thoughts on Meltdown & Spectre](https://xorl.wordpress.com/2018/01/10/thoughts-on-meltdown-spectre/)
4 4
5 5 ## Desktop
6 6

waja 修订了这个 Gist 8 years ago. 转到此修订

1 file changed, 1 insertion

spectre_meltdown.md

@@ -1,5 +1,6 @@
1 1 * [Meltdown and Spectre - Vulnerabilities in modern computers leak passwords and sensitive data.](https://spectreattack.com/)
2 2 * [Project Zero team at Google: Reading privileged memory with a side-channel](https://googleprojectzero.blogspot.de/2018/01/reading-privileged-memory-with-side.html)
3 + * [Thoughts on Meltdown & Spectre](https://xorl.wordpress.com/2018/01/10/thoughts-on-meltdown-spectre/)
3 4
4 5 ## Desktop
5 6

waja 修订了这个 Gist 8 years ago. 转到此修订

没有任何变更

waja 修订了这个 Gist 8 years ago. 转到此修订

1 file changed, 2 insertions, 1 deletion

spectre_meltdown.md

@@ -50,4 +50,5 @@
50 50
51 51 ## Random Links
52 52
53 - * [Known bugs sitting in upstream LTS kernels](https://news.ycombinator.com/item?id=16087736)
53 + * [Known bugs sitting in upstream LTS kernels](https://news.ycombinator.com/item?id=16087736)
54 + * [Meltdown and Spectre in Debian - 10.01.2018](https://www.decadent.org.uk/ben/blog/meltdown-and-spectre-in-debian.html)

waja 修订了这个 Gist 8 years ago. 转到此修订

1 file changed, 5 insertions, 1 deletion

spectre_meltdown.md

@@ -46,4 +46,8 @@
46 46
47 47 ### Microsoft
48 48
49 - * [Microsoft: Guidance to mitigate speculative execution side-channel vulnerabilities](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002)
49 + * [Microsoft: Guidance to mitigate speculative execution side-channel vulnerabilities](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002)
50 +
51 + ## Random Links
52 +
53 + * [Known bugs sitting in upstream LTS kernels](https://news.ycombinator.com/item?id=16087736)

waja 修订了这个 Gist 8 years ago. 转到此修订

1 file changed, 3 insertions

spectre_meltdown.md

@@ -23,10 +23,13 @@
23 23
24 24 #### iOS
25 25
26 + * 11.2: https://support.apple.com/de-de/HT208334
27 + * 11.2.1: https://support.apple.com/de-de/HT208334
26 28 * 11.2.2: https://support.apple.com/en-us/HT208401
27 29
28 30 #### macOS
29 31
32 + * 10.3.2: https://support.apple.com/de-de/HT208331
30 33 * 10.3.2: https://support.apple.com/en-us/HT208397
31 34
32 35 ## Servers / Cloud

waja 修订了这个 Gist 8 years ago. 转到此修订

1 file changed, 12 insertions

spectre_meltdown.md

@@ -17,6 +17,18 @@
17 17
18 18 * [KB4056892 (OS Build 16299.192)](https://support.microsoft.com/en-us/help/4056892/windows-10-update-kb4056892)
19 19
20 + ### Apple
21 +
22 + * https://support.apple.com/en-us/HT208394
23 +
24 + #### iOS
25 +
26 + * 11.2.2: https://support.apple.com/en-us/HT208401
27 +
28 + #### macOS
29 +
30 + * 10.3.2: https://support.apple.com/en-us/HT208397
31 +
20 32 ## Servers / Cloud
21 33
22 34 * [Meltdown and Spectre kernel update per operating system](https://docs.ovh.com/fr/dedicated/meltdown-spectre-kernel-update-per-operating-system/)

waja 修订了这个 Gist 8 years ago. 转到此修订

1 file changed, 2 insertions

spectre_meltdown.md

@@ -11,6 +11,8 @@
11 11
12 12 ### Microsoft
13 13
14 + * [SpecuCheck - a Windows utility for checking the state of the software mitigations against Meltdown and Spectre](https://ionescu007.github.io/SpecuCheck/)
15 +
14 16 #### Windows 10
15 17
16 18 * [KB4056892 (OS Build 16299.192)](https://support.microsoft.com/en-us/help/4056892/windows-10-update-kb4056892)