Date: Wed, 13 Jun 2012 17:27:02 -0700 From: Xin Li <delphij@delphij.net> To: Greg Lewis <glewis@eyesbeyond.com> Cc: freebsd-security@freebsd.org, d@delphij.net Subject: Re: FreeBSD Security Advisory FreeBSD-SA-12:04.sysret Message-ID: <4FD92FD6.1090007@delphij.net> In-Reply-To: <20120613223758.GA72817@misty.eyesbeyond.com> References: <201206121326.q5CDQXca078536@freefall.freebsd.org> <20120613223758.GA72817@misty.eyesbeyond.com>
next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 On 06/13/12 15:37, Greg Lewis wrote: > On Tue, Jun 12, 2012 at 01:26:33PM +0000, FreeBSD Security > Advisories wrote: >> IV. Workaround >> >> No workaround is available. >> >> However FreeBSD/amd64 running on AMD CPUs is not vulnerable to >> this particular problem. >> >> Systems with 64 bit capable CPUs, but running the 32 bit >> FreeBSD/i386 kernel are not vulnerable, nor are systems running >> on different processor architectures. > > I found these last two paragraphs a little confusing. Is the > correct interpretation that FreeBSD/amd64 running on Intel CPUs is > the vulnerable combination? Correct. Cheers, - -- Xin LI <delphij@delphij.net> https://www.delphij.net/ FreeBSD - The Power to Serve! Live free or die -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.19 (FreeBSD) iQEcBAEBCAAGBQJP2S/WAAoJEG80Jeu8UPuz9JMIALQwTqb6SDKAUwLkxupOgyEa 7dSHYAxwbNWKNvjbK0brS05kx5RdEmxdkoRqdKOlPcY8JnbqpbROWIbUHA8XIfCW igHIISTgQhiw5nx8XqMMoEfzztPR7UKr9rE+CToWLT8GbHWEpiYlE1RpIQgoZ0TK ldlQSOOMZ32zushxbM1ZncSM0/Rm9ie+ISezGfCV/lXqQUycVxnxjV/Euf6OKzxC xQC2nI21UIu1nZi8sfT0Qnlz8o/ehEYMmHDJgkphxLxMqtWW6l/WqdPMtEGWwBVB rBGRVQvkCrqu8aKBUsOFmX9+vZ4riDtggrXjSadAUGVQNMtBlHBPJ83vmyiQ5LA= =Qpu0 -----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4FD92FD6.1090007>