Date: Wed, 10 Jul 2019 16:37:45 +0000 From: Kevin <labadore@protonmail.ch> To: "freebsd-security@freebsd.org" <freebsd-security@freebsd.org> Subject: FreeBSD MDS Mitigation Message-ID: <1-e0UcMiG_xiNHOUE9o3duPx3uN6Loigx376zYIhPFYNE-khNPR1vB-gu5TAG-L_V9AL7gNrWsyurZ8bBcW1zMayEPgkl2SpalOGkrGfTEE=@protonmail.ch>
next in thread | raw e-mail | index | archive | help
Hello list. I am reading this page about FreeBSD security [ https://vez.mrs= k.me/freebsd-defaults.html ] and it says the Intel MDS mitigation is off by= default. So I tried. % sysctl hw.mds_disable_state hw.mds_disable_state: inactive Now I see the instructions in the advisory, but what about anyone who didn'= t? Or who did a new install and didn't read past advisories? I have an Intel CPU that is vulnerable. By applying the update and installi= ng the microcode package, I thought I was safe. Why? Why does FreeBSD let its users be vulnerable?
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1-e0UcMiG_xiNHOUE9o3duPx3uN6Loigx376zYIhPFYNE-khNPR1vB-gu5TAG-L_V9AL7gNrWsyurZ8bBcW1zMayEPgkl2SpalOGkrGfTEE=>