From owner-freebsd-questions@freebsd.org Sat Jan 13 20:40:07 2018 Return-Path: Delivered-To: freebsd-questions@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 9B3A2E7EDF6 for ; Sat, 13 Jan 2018 20:40:07 +0000 (UTC) (envelope-from ralf.mardorf@alice-dsl.net) Received: from mail37c50.megamailservers.eu (mail232c50.megamailservers.eu [91.136.10.242]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 07C8D76A30 for ; Sat, 13 Jan 2018 20:40:05 +0000 (UTC) (envelope-from ralf.mardorf@alice-dsl.net) X-Authenticated-User: ralf.mardorf.alice-dsl.net Received: from archlinux.localdomain (x4e3215f8.dyn.telefonica.de [78.50.21.248]) (authenticated bits=0) by mail37c50.megamailservers.eu (8.14.9/8.13.1) with ESMTP id w0DJNtBt008148 (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256 verify=NO); Sat, 13 Jan 2018 19:23:57 +0000 Date: Sat, 13 Jan 2018 20:24:01 +0100 From: Ralf Mardorf To: ubuntu-studio-users@lists.ubuntu.com Cc: LAU , FreeBSD questions Subject: Re: Meltdown =?UTF-8?B?4oCT?= Spectre Message-ID: <20180113202401.0b4f90c0@archlinux.localdomain> In-Reply-To: References: <20180113125406.285bf5cb@archlinux.localdomain> X-Mailer: Claws Mail 3.16.0git3 (GTK+ 2.24.32; x86_64-arch-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-CTCH-RefID: str=0001.0A0B0206.5A5A5CCE.002D, ss=1, re=0.000, recu=0.000, reip=0.000, cl=1, cld=1, fgs=0 X-CTCH-VOD: Unknown X-CTCH-Spam: Unknown X-CTCH-Score: 0.000 X-CTCH-Rules: X-CTCH-Flags: 0 X-CTCH-ScoreCust: 0.000 X-CSC: 0 X-CHA: v=2.2 cv=esev9shX c=1 sm=1 tr=0 a=+/38W5vFYDGaUbky4/S7Pg==:117 a=+/38W5vFYDGaUbky4/S7Pg==:17 a=IkcTkHD0fZMA:10 a=QyXUC8HyAAAA:8 a=JMmPWnB6zA7-vqktouwA:9 a=QEXdDO2ut3YA:10 a=YhjuxmyD_ykA:10 X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 13 Jan 2018 20:40:07 -0000 On Sat, 13 Jan 2018 15:29:27 +0000, Pablo Fernandez wrote: >El s=C3=A1b., 13 ene. 2018 13:58, Thomas Pfundt escribi=C3=B3: >> However, this site doesn't list your Celeron G as vulnerable: >> https://security-center.intel.com/advisory.aspx?intelid=3DINTEL-SA-00088= &languageid=3Den-fr >> Do you even need to concern with the patch and performance at this >> point? That is interesting news. I'll forward this, since actually it's claimed that all x86 CPUs since the Pentium Pro from 1995 suffer from this issue. Does anybody know how to value this information from Intel?