ZombieLoad Attack: Intel Exploits You... Again!

Peter Pentchev roam at ringlet.net
Wed May 15 10:59:01 UTC 2019


On Wed, May 15, 2019 at 03:24:54AM -0400, grarpamp wrote:
> https://zombieloadattack.com/
> https://zombieloadattack.com/zombieload.pdf
> https://www.cyberus-technology.de/posts/2019-05-14-zombieload.html
> https://github.com/IAIK/ZombieLoad
> https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files
> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130
> https://www.youtube.com/watch?v=wQvgyChrk_g
> 
> FreeBSD people...
> See linux patches in and update your microcode, ports, etc.

So... https://www.freebsd.org/security/advisories/FreeBSD-SA-19:07.mds.asc then?

G'luck,
Peter

-- 
Peter Pentchev  roam@{ringlet.net,debian.org,FreeBSD.org} pp at storpool.com
PGP key:        http://people.FreeBSD.org/~roam/roam.key.asc
Key fingerprint 2EE7 A7A5 17FC 124C F115  C354 651E EFB0 2527 DF13
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://lists.freebsd.org/pipermail/freebsd-security/attachments/20190515/b700f863/attachment.sig>


More information about the freebsd-security mailing list