From owner-freebsd-security@FreeBSD.ORG Thu Jun 14 00:23:03 2012 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (unknown [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id D30EF106564A for ; Thu, 14 Jun 2012 00:23:03 +0000 (UTC) (envelope-from oliver.pntr@gmail.com) Received: from mail-gg0-f182.google.com (mail-gg0-f182.google.com [209.85.161.182]) by mx1.freebsd.org (Postfix) with ESMTP id 8BBB28FC08 for ; Thu, 14 Jun 2012 00:23:03 +0000 (UTC) Received: by ggnm2 with SMTP id m2so1127751ggn.13 for ; Wed, 13 Jun 2012 17:23:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=nwAHvrjDJBSGlKvvR4Q8F3l+FYKyUbN/UHEL/MeHhS8=; b=lwj6xqFYj16lZjFu9Y7I2cjty+75EOfzxad2pSmgz+vxS4+Cym1xhKN/psod+UIdNT iGyvDnRdbugwO9lwCxOm+hK7Hmgd0GjEwtVFj1iJ++ICpwjlAgRccsMGmK6hsSicQ+k6 KklP/OIdgKFp6oY8jcqqlgHNo0T4OQyP8mRXetYywJOZRQC2iOxBLWR+eRrKha/OZh27 rK97B0Fg7rF1zt8WcOqG5j1dhfO2GOn66FgMyfntzWHYaxDKjAh64S5dpbiFFkKZwCq+ Xo5ZZdN82WkCdfCMFznFmPqGCNzA7+sVp/nB8+gUe/t+b5v0c4mXXSxhfIVzx3v+Guje W2XQ== MIME-Version: 1.0 Received: by 10.236.181.199 with SMTP id l47mr36513995yhm.85.1339633382867; Wed, 13 Jun 2012 17:23:02 -0700 (PDT) Received: by 10.236.46.233 with HTTP; Wed, 13 Jun 2012 17:23:02 -0700 (PDT) In-Reply-To: <20120613223758.GA72817@misty.eyesbeyond.com> References: <201206121326.q5CDQXca078536@freefall.freebsd.org> <20120613223758.GA72817@misty.eyesbeyond.com> Date: Thu, 14 Jun 2012 02:23:02 +0200 Message-ID: From: Oliver Pinter To: Greg Lewis Content-Type: text/plain; charset=ISO-8859-1 Cc: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-12:04.sysret X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 14 Jun 2012 00:23:03 -0000 On 6/14/12, Greg Lewis wrote: > On Tue, Jun 12, 2012 at 01:26:33PM +0000, FreeBSD Security Advisories > wrote: >> IV. Workaround >> >> No workaround is available. >> >> However FreeBSD/amd64 running on AMD CPUs is not vulnerable to this >> particular problem. >> >> Systems with 64 bit capable CPUs, but running the 32 bit FreeBSD/i386 >> kernel are not vulnerable, nor are systems running on different >> processor architectures. > > I found these last two paragraphs a little confusing. Is the correct > interpretation that FreeBSD/amd64 running on Intel CPUs is the vulnerable > combination? > > -- > Greg Lewis Email : glewis@eyesbeyond.com > Eyes Beyond Web : http://www.eyesbeyond.com > Information Technology FreeBSD : glewis@FreeBSD.org > _______________________________________________ > freebsd-security@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-security > To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org" > http://www.kb.cert.org/vuls/byvendor?searchview&Query=FIELD+Reference=649219&SearchOrder=4