Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 15 May 2019 14:37:27 +0200
From:      =?UTF-8?Q?Fernando_Apestegu=C3=ADa?= <fernape@freebsd.org>
To:        grarpamp <grarpamp@gmail.com>, freebsd-security@freebsd.org,  freebsd-questions@freebsd.org
Subject:   Re: ZombieLoad Attack: Intel Exploits You... Again!
Message-ID:  <CAGwOe2b8pDNW6ZXj10VZHsYZd=W9GMiabSB9JLec0W83Kq3_jA@mail.gmail.com>
In-Reply-To: <20190515105305.GL18665@straylight.m.ringlet.net>
References:  <CAD2Ti295ixR4eOP4PbtcS6MWU_=8-T_WqNNATK7kar-Q7Rzn8g@mail.gmail.com> <20190515105305.GL18665@straylight.m.ringlet.net>

next in thread | previous in thread | raw e-mail | index | archive | help
El mi=C3=A9., 15 may. 2019 13:06, Peter Pentchev <roam@ringlet.net> escribi=
=C3=B3:

> On Wed, May 15, 2019 at 03:24:54AM -0400, grarpamp wrote:
> > https://zombieloadattack.com/
> > https://zombieloadattack.com/zombieload.pdf
> > https://www.cyberus-technology.de/posts/2019-05-14-zombieload.html
> > https://github.com/IAIK/ZombieLoad
> > https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files
> > https://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2018-12130
> > https://www.youtube.com/watch?v=3DwQvgyChrk_g
> >
> > FreeBSD people...
> > See linux patches in and update your microcode, ports, etc.
>
> So... https://www.freebsd.org/security/advisories/FreeBSD-SA-19:07.mds.as=
c
> then?
>

So, a big applause is in order for the quick response.


> G'luck,
> Peter
>
> --
> Peter Pentchev  roam@{ringlet.net,debian.org,FreeBSD.org} pp@storpool.com
> PGP key:        http://people.FreeBSD.org/~roam/roam.key.asc
> Key fingerprint 2EE7 A7A5 17FC 124C F115  C354 651E EFB0 2527 DF13
>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAGwOe2b8pDNW6ZXj10VZHsYZd=W9GMiabSB9JLec0W83Kq3_jA>