From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 63E8C1382C5 for ; Wed, 14 Feb 2018 17:28:36 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 9E179E0B72; Wed, 14 Feb 2018 17:28:29 +0000 (UTC) Received: from blaine.gmane.org (unknown [195.159.176.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 2165BE0B46 for ; Wed, 14 Feb 2018 17:28:29 +0000 (UTC) Received: from list by blaine.gmane.org with local (Exim 4.84_2) (envelope-from ) id 1em0oz-0001BY-DH for gentoo-user@lists.gentoo.org; Wed, 14 Feb 2018 18:26:17 +0100 X-Injected-Via-Gmane: http://gmane.org/ To: gentoo-user@lists.gentoo.org From: Nikos Chantziaras Subject: [gentoo-user] Re: Vulnerability info in /sys Date: Wed, 14 Feb 2018 19:29:05 +0200 Message-ID: References: <0f3b0c4c-1f72-072a-cb80-5f146d5157a8@gmail.com> <20180213033953.3e3xvylqztf7wear@matica.foolinux.mooo.com> <4d70d8f7-2670-4e2a-e302-2e9b901f2611@gmail.com> Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-Complaints-To: usenet@blaine.gmane.org User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 In-Reply-To: <4d70d8f7-2670-4e2a-e302-2e9b901f2611@gmail.com> Content-Language: en-US X-Archives-Salt: 66896f12-9233-4493-ab49-dd0f34d9e35d X-Archives-Hash: 21847ab2b55d13548ec978c1447babc8 On 14/02/18 04:38, Daniel Frey wrote: > On 02/12/18 19:39, Ian Zimmerman wrote: >> On 2018-02-12 19:24, Daniel Frey wrote: >> >>> I've read online that there should be vulnerability info (Meltdown, >>> Spectre) in /sys under /sys/devices/system/cpu/vulnerabilities but this >>> doesn't exist on my PC. >>> [...] >> >> See the other threads: you need at least 4.9.79 for the /sys bits. >> [...] > > I'm surprised I missed those threads, I read all messages on here. > According to the thread I found it's actually starts on 4.9.77, I'm just > on the latest stable (.76). During "special emergencies" like this one, it would be a good idea to use the latest 4.9.x, regardless of whether portage marked it "stable" or not. At least for a while and until the situation has settled down again.