Date: Fri, 5 Jan 2018 15:46:08 -0500 From: Mike Tancsa <mike@sentex.net> To: Andrew Duane <aduane@juniper.net>, Freebsd Security <freebsd-security@freebsd.org> Subject: Re: Intel hardware bug Message-ID: <6ed8d379-103d-e6f0-9c4a-ede69b5a60b4@sentex.net> In-Reply-To: <SN1PR0501MB2125B36067CD93A5B95AC74DCE1C0@SN1PR0501MB2125.namprd05.prod.outlook.com> References: <736a2b77-d4a0-b03f-8a6b-6a717f5744d4@metricspace.net> <2594.1515141192@segfault.tristatelogic.com> <809675000.867372.1515146821354@mail.yahoo.com> <250f3a77-822b-fba5-dcd7-758dfec94554@metricspace.net> <SN1PR0501MB2125B36067CD93A5B95AC74DCE1C0@SN1PR0501MB2125.namprd05.prod.outlook.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On 1/5/2018 8:30 AM, Andrew Duane wrote: > Regardless, is there someone within FreeBSD that is working on patches for this set of problems, at least for Intel? Linux already has at least some, and I believe NetBSD does too. Of course Windows has already pushed out a Windows10 fix, 7 and 8 are coming. There is an official announcement on the FreeBSD site (quote below). Not sure about NetBSD, but DragonFly seems to have published some patches. Looks quite extensive :( https://www.phoronix.com/scan.php?page=news_item&px=DragonFly-Meltdown-Fixed " About the Meltdown and Spectre attacks: FreeBSD was made aware of the problems in late December 2017. We're working with CPU vendors and the published papers on these attacks to mitigate them on FreeBSD. Due to the fundamental nature of the attacks, no estimate is yet available for the publication date of patches." ---Mike -- ------------------- Mike Tancsa, tel +1 519 651 3400 Sentex Communications, mike@sentex.net Providing Internet services since 1994 www.sentex.net Cambridge, Ontario Canada http://www.tancsa.com/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?6ed8d379-103d-e6f0-9c4a-ede69b5a60b4>
