Are there something to do in OMV LX 3.03 about Meltdown and Spectre?

Thanks. I also thought that it’s better to release 57.0.4 even without stylo.

Installed. Seems ok :slight_smile:
More: stylo seems activated!
Very good job :ok_hand:

Yes @crisb did an excellent work and found a real issue why FF does not build with stylo enabled.

Yep, thanks to both of you.

With a latest kernel 4.14.14-22

[root@tpg-pc tpg]# uname -a
Linux tpg-pc 4.14.14-desktop-22omv #1 SMP PREEMPT Sat Jan 20 15:52:47 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux


[root@tpg-pc tpg]# ./spectre-meltdown-checker.sh 
Spectre and Meltdown mitigation detection tool v0.31

Checking for vulnerabilities against running kernel Linux 4.14.14-desktop-22omv #1 SMP PREEMPT Sat Jan 20 15:52:47 UTC 2018 x86_64
CPU is Intel(R) Core(TM) i5-4300U CPU @ 1.90GHz

CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
* Checking whether we're safe according to the /sys interface:  NO  (kernel confirms your system is vulnerable)
> STATUS:  VULNERABLE  (Vulnerable)

CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
* Checking whether we're safe according to the /sys interface:  YES  (kernel confirms that the mitigation is active)
> STATUS:  NOT VULNERABLE  (Mitigation: Full generic retpoline)

CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
* Checking whether we're safe according to the /sys interface:  YES  (kernel confirms that the mitigation is active)
> STATUS:  NOT VULNERABLE  (Mitigation: PTI)

A false sense of security is worse than no security at all, see --disclaimer

It’s been some time since there has been seen any activity on this important issue so I just ran on an up to date Lx 3 system the ‘spectre-meltdown-checker.sh’ script. See this thread for results.