From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 8474F1382C5 for ; Thu, 15 Feb 2018 01:22:25 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id CA190E0CA7; Thu, 15 Feb 2018 01:22:18 +0000 (UTC) Received: from blaine.gmane.org (unknown [195.159.176.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 528AEE0AE7 for ; Thu, 15 Feb 2018 01:22:18 +0000 (UTC) Received: from list by blaine.gmane.org with local (Exim 4.84_2) (envelope-from ) id 1em8DT-00032L-3i for gentoo-user@lists.gentoo.org; Thu, 15 Feb 2018 02:20:03 +0100 X-Injected-Via-Gmane: http://gmane.org/ To: gentoo-user@lists.gentoo.org From: Nikos Chantziaras Subject: [gentoo-user] Re: Vulnerability info in /sys Date: Thu, 15 Feb 2018 03:22:37 +0200 Message-ID: References: <0f3b0c4c-1f72-072a-cb80-5f146d5157a8@gmail.com> <20180213033953.3e3xvylqztf7wear@matica.foolinux.mooo.com> <4d70d8f7-2670-4e2a-e302-2e9b901f2611@gmail.com> Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-Complaints-To: usenet@blaine.gmane.org User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 In-Reply-To: Content-Language: en-US X-Archives-Salt: c82e9fa2-ea4f-450c-866f-c15aeb62ec53 X-Archives-Hash: 0cc551d87f47c1ddc3dc19bd49fa1b86 On 15/02/18 02:57, Daniel Frey wrote: > On 02/14/18 09:29, Nikos Chantziaras wrote: >> On 14/02/18 04:38, Daniel Frey wrote: >>> On 02/12/18 19:39, Ian Zimmerman wrote: >>>> On 2018-02-12 19:24, Daniel Frey wrote: >>>> >>>>> I've read online that there should be vulnerability info (Meltdown, >>>>> Spectre) in /sys under /sys/devices/system/cpu/vulnerabilities but this >>>>> doesn't exist on my PC. >>>>> [...] >>>> >>>> See the other threads: you need at least 4.9.79 for the /sys bits. >>>> [...] >>> >>> I'm surprised I missed those threads, I read all messages on here. >>> According to the thread I found it's actually starts on 4.9.77, I'm just >>> on the latest stable (.76). >> >> During "special emergencies" like this one, it would be a good idea to >> use the latest 4.9.x, regardless of whether portage marked it "stable" >> or not. At least for a while and until the situation has settled down >> again. >> >> > > Nah, I like stability over everything else. I recall lots of pain and > instability in January when everyone rushed to patch the flaws (both > Windows and linux.) > > These are my personal computers, not a work environment. Personal preference of course, but I prefer to risk some instability compared to risking having a bitcoin miner infesting my PC or some botnet worm. That's just me though.