Date: Wed, 13 Jul 2022 02:42:59 -0400 From: grarpamp <grarpamp@gmail.com> To: freebsd-security@freebsd.org Subject: Re: Retbleed, another speculative execution attack Message-ID: <CAD2Ti29HLDqiK0JC6A%2BUY_FHECooNRFsd_V7HxuskUSt0kdSUQ@mail.gmail.com> In-Reply-To: <6b8953b3-eaa8-22aa-7dc9-0f07875a9588@sentex.net> References: <c8a764a7-7804-c021-9ad7-b23a585c4239@sentex.net> <6b8953b3-eaa8-22aa-7dc9-0f07875a9588@sentex.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On 7/12/22, mike tancsa <mike@sentex.net> wrote: >> Just wondering how this might impact FreeBSD ? > > https://news.ycombinator.com/item?id=32071949 > > https://comsec.ethz.ch/research/microarch/retbleed/ FreeBSD should keep a wiki table of all these HW attacks with at least three columns... - The exploit - Were mitigations published - Were those or others applied Point everyone there.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAD2Ti29HLDqiK0JC6A%2BUY_FHECooNRFsd_V7HxuskUSt0kdSUQ>