Date: Thu, 14 Jun 2012 08:21:47 -0400 From: John Baldwin <jhb@freebsd.org> To: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-12:04.sysret Message-ID: <201206140821.47265.jhb@freebsd.org> In-Reply-To: <20120613223758.GA72817@misty.eyesbeyond.com> References: <201206121326.q5CDQXca078536@freefall.freebsd.org> <20120613223758.GA72817@misty.eyesbeyond.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wednesday, June 13, 2012 6:37:58 pm Greg Lewis wrote: > On Tue, Jun 12, 2012 at 01:26:33PM +0000, FreeBSD Security Advisories wrote: > > IV. Workaround > > > > No workaround is available. > > > > However FreeBSD/amd64 running on AMD CPUs is not vulnerable to this > > particular problem. > > > > Systems with 64 bit capable CPUs, but running the 32 bit FreeBSD/i386 > > kernel are not vulnerable, nor are systems running on different > > processor architectures. > > I found these last two paragraphs a little confusing. Is the correct > interpretation that FreeBSD/amd64 running on Intel CPUs is the vulnerable > combination? It is only know that AMD CPUs are safe. It is not known if non-AMD, non-Intel CPUs (e.g. the 64-bit capable VIA CPUs) are vulnerable. -- John Baldwin
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201206140821.47265.jhb>
