Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 13 Jul 2022 02:42:59 -0400
From:      grarpamp <grarpamp@gmail.com>
To:        freebsd-security@freebsd.org
Subject:   Re: Retbleed, another speculative execution attack
Message-ID:  <CAD2Ti29HLDqiK0JC6A%2BUY_FHECooNRFsd_V7HxuskUSt0kdSUQ@mail.gmail.com>
In-Reply-To: <6b8953b3-eaa8-22aa-7dc9-0f07875a9588@sentex.net>
References:  <c8a764a7-7804-c021-9ad7-b23a585c4239@sentex.net> <6b8953b3-eaa8-22aa-7dc9-0f07875a9588@sentex.net>

next in thread | previous in thread | raw e-mail | index | archive | help
On 7/12/22, mike tancsa <mike@sentex.net> wrote:
>> Just wondering how this might impact FreeBSD ?
>
> https://news.ycombinator.com/item?id=32071949
>
> https://comsec.ethz.ch/research/microarch/retbleed/

FreeBSD should keep a wiki table of all these
HW attacks with at least three columns...
- The exploit
- Were mitigations published
- Were those or others applied

Point everyone there.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAD2Ti29HLDqiK0JC6A%2BUY_FHECooNRFsd_V7HxuskUSt0kdSUQ>