Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 13 Jun 2012 17:27:02 -0700
From:      Xin Li <delphij@delphij.net>
To:        Greg Lewis <glewis@eyesbeyond.com>
Cc:        freebsd-security@freebsd.org, d@delphij.net
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-12:04.sysret
Message-ID:  <4FD92FD6.1090007@delphij.net>
In-Reply-To: <20120613223758.GA72817@misty.eyesbeyond.com>
References:  <201206121326.q5CDQXca078536@freefall.freebsd.org> <20120613223758.GA72817@misty.eyesbeyond.com>

next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On 06/13/12 15:37, Greg Lewis wrote:
> On Tue, Jun 12, 2012 at 01:26:33PM +0000, FreeBSD Security
> Advisories wrote:
>> IV.  Workaround
>> 
>> No workaround is available.
>> 
>> However FreeBSD/amd64 running on AMD CPUs is not vulnerable to
>> this particular problem.
>> 
>> Systems with 64 bit capable CPUs, but running the 32 bit
>> FreeBSD/i386 kernel are not vulnerable, nor are systems running
>> on different processor architectures.
> 
> I found these last two paragraphs a little confusing.  Is the
> correct interpretation that FreeBSD/amd64 running on Intel CPUs is
> the vulnerable combination?

Correct.

Cheers,
- -- 
Xin LI <delphij@delphij.net>	https://www.delphij.net/
FreeBSD - The Power to Serve!		Live free or die


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.19 (FreeBSD)

iQEcBAEBCAAGBQJP2S/WAAoJEG80Jeu8UPuz9JMIALQwTqb6SDKAUwLkxupOgyEa
7dSHYAxwbNWKNvjbK0brS05kx5RdEmxdkoRqdKOlPcY8JnbqpbROWIbUHA8XIfCW
igHIISTgQhiw5nx8XqMMoEfzztPR7UKr9rE+CToWLT8GbHWEpiYlE1RpIQgoZ0TK
ldlQSOOMZ32zushxbM1ZncSM0/Rm9ie+ISezGfCV/lXqQUycVxnxjV/Euf6OKzxC
xQC2nI21UIu1nZi8sfT0Qnlz8o/ehEYMmHDJgkphxLxMqtWW6l/WqdPMtEGWwBVB
rBGRVQvkCrqu8aKBUsOFmX9+vZ4riDtggrXjSadAUGVQNMtBlHBPJ83vmyiQ5LA=
=Qpu0
-----END PGP SIGNATURE-----



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4FD92FD6.1090007>