ZombieLoad Attack: Intel Exploits You... Again!
Peter Pentchev
roam at ringlet.net
Wed May 15 10:59:01 UTC 2019
On Wed, May 15, 2019 at 03:24:54AM -0400, grarpamp wrote:
> https://zombieloadattack.com/
> https://zombieloadattack.com/zombieload.pdf
> https://www.cyberus-technology.de/posts/2019-05-14-zombieload.html
> https://github.com/IAIK/ZombieLoad
> https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files
> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130
> https://www.youtube.com/watch?v=wQvgyChrk_g
>
> FreeBSD people...
> See linux patches in and update your microcode, ports, etc.
So... https://www.freebsd.org/security/advisories/FreeBSD-SA-19:07.mds.asc then?
G'luck,
Peter
--
Peter Pentchev roam@{ringlet.net,debian.org,FreeBSD.org} pp at storpool.com
PGP key: http://people.FreeBSD.org/~roam/roam.key.asc
Key fingerprint 2EE7 A7A5 17FC 124C F115 C354 651E EFB0 2527 DF13
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://lists.freebsd.org/pipermail/freebsd-questions/attachments/20190515/b700f863/attachment.sig>
More information about the freebsd-questions
mailing list