Files
heads/boards/EOL_UNTESTED_t530-maximized
Thierry Laurion 18b87d2d4c EOL board configs: Add big fat warning on first line; only proper mitigation being to revisit OPSEC for memory use, which points to anarsec (which I helped write/edit, exactly for a moment like this).
Repro:
find boards/ -type f -name *.config| grep -Ev 'talos-2|qemu|kgpe|v560tu|v540tu|nv4x|ns50|librem_mini|librem_mini_v2|librem_14|librem_11|librem_l1um_v2'| while read file; do sed -i '1i # WARNING: This system remains perpetually vulnerable to Spectre v2 (CVE-2017-5715). Mitigations and microcode updates previously applied are now known to be ineffective due to QSB-107 and related CVEs. If Spectre v2 is a concern in your threat model, consider migrating to a platform with ongoing microcode support. Proper OPSEC for Memory Use MUST be followed:https://www.anarsec.guide/posts/qubes/#appendix-opsec-for-memory-use' $file; done

Signed-off-by: Thierry Laurion <insurgo@riseup.net>
2025-05-29 13:54:28 -04:00
..