Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 14 Jun 2012 02:23:02 +0200
From:      Oliver Pinter <oliver.pntr@gmail.com>
To:        Greg Lewis <glewis@eyesbeyond.com>
Cc:        freebsd-security@freebsd.org
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-12:04.sysret
Message-ID:  <CAPjTQNGJW4C6=z-79%2Bq9KfUNADq6iQa0kgQVw5wYNTPDkdwMFw@mail.gmail.com>
In-Reply-To: <20120613223758.GA72817@misty.eyesbeyond.com>
References:  <201206121326.q5CDQXca078536@freefall.freebsd.org> <20120613223758.GA72817@misty.eyesbeyond.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On 6/14/12, Greg Lewis <glewis@eyesbeyond.com> wrote:
> On Tue, Jun 12, 2012 at 01:26:33PM +0000, FreeBSD Security Advisories
> wrote:
>> IV.  Workaround
>>
>> No workaround is available.
>>
>> However FreeBSD/amd64 running on AMD CPUs is not vulnerable to this
>> particular problem.
>>
>> Systems with 64 bit capable CPUs, but running the 32 bit FreeBSD/i386
>> kernel are not vulnerable, nor are systems running on different
>> processor architectures.
>
> I found these last two paragraphs a little confusing.  Is the correct
> interpretation that FreeBSD/amd64 running on Intel CPUs is the vulnerable
> combination?
>
> --
> Greg Lewis                          Email   : glewis@eyesbeyond.com
> Eyes Beyond                         Web     : http://www.eyesbeyond.com
> Information Technology              FreeBSD : glewis@FreeBSD.org
> _______________________________________________
> freebsd-security@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-security
> To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
>

http://www.kb.cert.org/vuls/byvendor?searchview&Query=FIELD+Reference=649219&SearchOrder=4



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAPjTQNGJW4C6=z-79%2Bq9KfUNADq6iQa0kgQVw5wYNTPDkdwMFw>