From owner-freebsd-security@freebsd.org Wed Mar 14 16:00:50 2018 Return-Path: Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 12E6DF5AAD3 for ; Wed, 14 Mar 2018 16:00:50 +0000 (UTC) (envelope-from mike@sentex.net) Received: from smarthost2.sentex.ca (smarthost2.sentex.ca [IPv6:2607:f3e0:80:80::2]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "smarthost.sentex.ca", Issuer "smarthost.sentex.ca" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 6640487874 for ; Wed, 14 Mar 2018 16:00:49 +0000 (UTC) (envelope-from mike@sentex.net) Received: from lava.sentex.ca (lava.sentex.ca [IPv6:2607:f3e0:0:5::11]) by smarthost2.sentex.ca (8.15.2/8.15.2) with ESMTPS id w2EG0mTB008561 (version=TLSv1 cipher=DHE-RSA-CAMELLIA256-SHA bits=256 verify=NO) for ; Wed, 14 Mar 2018 12:00:48 -0400 (EDT) (envelope-from mike@sentex.net) Received: from [192.168.43.26] (saphire3.sentex.net [192.168.43.26]) by lava.sentex.ca (8.15.2/8.15.2) with ESMTP id w2EG0kbX070193; Wed, 14 Mar 2018 12:00:47 -0400 (EDT) (envelope-from mike@sentex.net) Subject: Re: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-18:03.speculative_execution To: Gordon Tetlow Cc: freebsd-security References: <20180314042924.DE4B71126@freefall.freebsd.org> From: Mike Tancsa Organization: Sentex Communications Message-ID: <19c0a76c-bb35-0b7b-2c3c-fe9a2a8accba@sentex.net> Date: Wed, 14 Mar 2018 12:00:46 -0400 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.78 X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 14 Mar 2018 16:00:50 -0000 On 3/14/2018 11:58 AM, Gordon Tetlow wrote: > The Special Note in the advisory discusses this: Sorry about that, my old person eyes missed over that section twice somehow :( ---Mike > > Special Note:   Speculative execution vulnerability mitigation is a work >                 in progress.  This advisory addresses the most significant >                 issues for FreeBSD 11.1 on amd64 CPUs.  We expect to update >                 this advisory to include 10.x for amd64 CPUs.  Future > FreeBSD >                 releases will address this issue on i386 and other CPUs. >                 freebsd-update will include changes on i386 as part of this >                 update due to common code changes shared between amd64 and >                 i386, however it contains no functional changes for i386 (in >                 particular, it does not mitigate the issue on i386). > > On Wed, Mar 14, 2018 at 7:06 AM, Mike Tancsa > wrote: > > On 3/14/2018 12:29 AM, FreeBSD Security Advisories wrote: > > Affects:        All supported versions of FreeBSD. > > Corrected:      2018-02-17 18:00:01 UTC (stable/11, 11.1-STABLE) > >                 2018-03-14 04:00:00 UTC (releng/11.1, 11.1-RELEASE-p8) > > Hi, >         Are these corrections just AMD64 ? Or does it fix it on i386 > as well ? > >         ---Mike > -- ------------------- Mike Tancsa, tel +1 519 651 3400 x203 Sentex Communications, mike@sentex.net Providing Internet services since 1994 www.sentex.net Cambridge, Ontario Canada