Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 5 Jan 2018 15:46:08 -0500
From:      Mike Tancsa <mike@sentex.net>
To:        Andrew Duane <aduane@juniper.net>, Freebsd Security <freebsd-security@freebsd.org>
Subject:   Re: Intel hardware bug
Message-ID:  <6ed8d379-103d-e6f0-9c4a-ede69b5a60b4@sentex.net>
In-Reply-To: <SN1PR0501MB2125B36067CD93A5B95AC74DCE1C0@SN1PR0501MB2125.namprd05.prod.outlook.com>
References:  <736a2b77-d4a0-b03f-8a6b-6a717f5744d4@metricspace.net> <2594.1515141192@segfault.tristatelogic.com> <809675000.867372.1515146821354@mail.yahoo.com> <250f3a77-822b-fba5-dcd7-758dfec94554@metricspace.net> <SN1PR0501MB2125B36067CD93A5B95AC74DCE1C0@SN1PR0501MB2125.namprd05.prod.outlook.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On 1/5/2018 8:30 AM, Andrew Duane wrote:
> Regardless, is there someone within FreeBSD that is working on patches for this set of problems, at least for Intel? Linux already has at least some, and I believe NetBSD does too. Of course Windows has already pushed out a Windows10 fix, 7 and 8 are coming.


There is an official announcement on the FreeBSD site (quote below). Not
sure about NetBSD, but DragonFly seems to have published some patches.
Looks quite extensive :(

https://www.phoronix.com/scan.php?page=news_item&px=DragonFly-Meltdown-Fixed



" About the Meltdown and Spectre attacks: FreeBSD was made aware of the
problems in late December 2017. We're working with CPU vendors and the
published papers on these attacks to mitigate them on FreeBSD. Due to
the fundamental nature of the attacks, no estimate is yet available for
the publication date of patches."


	---Mike


-- 
-------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, mike@sentex.net
Providing Internet services since 1994 www.sentex.net
Cambridge, Ontario Canada   http://www.tancsa.com/



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?6ed8d379-103d-e6f0-9c4a-ede69b5a60b4>