Date: Wed, 15 May 2019 14:37:27 +0200 From: =?UTF-8?Q?Fernando_Apestegu=C3=ADa?= <fernape@freebsd.org> To: grarpamp <grarpamp@gmail.com>, freebsd-security@freebsd.org, freebsd-questions@freebsd.org Subject: Re: ZombieLoad Attack: Intel Exploits You... Again! Message-ID: <CAGwOe2b8pDNW6ZXj10VZHsYZd=W9GMiabSB9JLec0W83Kq3_jA@mail.gmail.com> In-Reply-To: <20190515105305.GL18665@straylight.m.ringlet.net> References: <CAD2Ti295ixR4eOP4PbtcS6MWU_=8-T_WqNNATK7kar-Q7Rzn8g@mail.gmail.com> <20190515105305.GL18665@straylight.m.ringlet.net>
next in thread | previous in thread | raw e-mail | index | archive | help
El mi=C3=A9., 15 may. 2019 13:06, Peter Pentchev <roam@ringlet.net> escribi= =C3=B3: > On Wed, May 15, 2019 at 03:24:54AM -0400, grarpamp wrote: > > https://zombieloadattack.com/ > > https://zombieloadattack.com/zombieload.pdf > > https://www.cyberus-technology.de/posts/2019-05-14-zombieload.html > > https://github.com/IAIK/ZombieLoad > > https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files > > https://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2018-12130 > > https://www.youtube.com/watch?v=3DwQvgyChrk_g > > > > FreeBSD people... > > See linux patches in and update your microcode, ports, etc. > > So... https://www.freebsd.org/security/advisories/FreeBSD-SA-19:07.mds.as= c > then? > So, a big applause is in order for the quick response. > G'luck, > Peter > > -- > Peter Pentchev roam@{ringlet.net,debian.org,FreeBSD.org} pp@storpool.com > PGP key: http://people.FreeBSD.org/~roam/roam.key.asc > Key fingerprint 2EE7 A7A5 17FC 124C F115 C354 651E EFB0 2527 DF13 >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAGwOe2b8pDNW6ZXj10VZHsYZd=W9GMiabSB9JLec0W83Kq3_jA>