Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 10 Jul 2019 16:37:45 +0000
From:      Kevin <labadore@protonmail.ch>
To:        "freebsd-security@freebsd.org" <freebsd-security@freebsd.org>
Subject:   FreeBSD MDS Mitigation
Message-ID:  <1-e0UcMiG_xiNHOUE9o3duPx3uN6Loigx376zYIhPFYNE-khNPR1vB-gu5TAG-L_V9AL7gNrWsyurZ8bBcW1zMayEPgkl2SpalOGkrGfTEE=@protonmail.ch>

next in thread | raw e-mail | index | archive | help
Hello list. I am reading this page about FreeBSD security [ https://vez.mrs=
k.me/freebsd-defaults.html ] and it says the Intel MDS mitigation is off by=
 default. So I tried.

% sysctl hw.mds_disable_state
hw.mds_disable_state: inactive

Now I see the instructions in the advisory, but what about anyone who didn'=
t? Or who did a new install and didn't read past advisories?

I have an Intel CPU that is vulnerable. By applying the update and installi=
ng the microcode package, I thought I was safe.

Why? Why does FreeBSD let its users be vulnerable?



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1-e0UcMiG_xiNHOUE9o3duPx3uN6Loigx376zYIhPFYNE-khNPR1vB-gu5TAG-L_V9AL7gNrWsyurZ8bBcW1zMayEPgkl2SpalOGkrGfTEE=>