Add news blurb about the micro-architecture attacks driven by
speculative execution on Intel, Arm and AMD cpus. Submitted by: pi@ (with language tweaks) Reviewed by: brd@
This commit is contained in:
parent
d7fadf084e
commit
810c5a528d
Notes:
svn2git
2020-12-08 03:00:23 +00:00
svn path=/head/; revision=51364
1 changed files with 21 additions and 0 deletions
|
@ -28,6 +28,27 @@
|
|||
$FreeBSD$
|
||||
</cvs:keyword>
|
||||
|
||||
<year>
|
||||
<name>2018</name>
|
||||
<month>
|
||||
<name>1</name>
|
||||
<day>
|
||||
<name>4</name>
|
||||
|
||||
<event>
|
||||
<p>About the <a href="https://meltdownattack.com/">Meltdown</a>
|
||||
and <a href="https://spectreattack.com/">Spectre</a> attacks:
|
||||
FreeBSD was made aware of the problems in late December 2017.
|
||||
We're working with CPU vendors and the published papers on
|
||||
these attacks to mitigate them on FreeBSD. Due to the
|
||||
fundamental nature of the attacks, no estimate is yet
|
||||
available for the publication date of patches.</p>
|
||||
</event>
|
||||
</day>
|
||||
</month>
|
||||
|
||||
</year>
|
||||
|
||||
<year>
|
||||
<name>2017</name>
|
||||
|
||||
|
|
Loading…
Reference in a new issue