Add news blurb about the micro-architecture attacks driven by
speculative execution on Intel, Arm and AMD cpus. Submitted by: pi@ (with language tweaks) Reviewed by: brd@
This commit is contained in:
parent
d7fadf084e
commit
810c5a528d
Notes:
svn2git
2020-12-08 03:00:23 +00:00
svn path=/head/; revision=51364
1 changed files with 21 additions and 0 deletions
|
@ -28,6 +28,27 @@
|
||||||
$FreeBSD$
|
$FreeBSD$
|
||||||
</cvs:keyword>
|
</cvs:keyword>
|
||||||
|
|
||||||
|
<year>
|
||||||
|
<name>2018</name>
|
||||||
|
<month>
|
||||||
|
<name>1</name>
|
||||||
|
<day>
|
||||||
|
<name>4</name>
|
||||||
|
|
||||||
|
<event>
|
||||||
|
<p>About the <a href="https://meltdownattack.com/">Meltdown</a>
|
||||||
|
and <a href="https://spectreattack.com/">Spectre</a> attacks:
|
||||||
|
FreeBSD was made aware of the problems in late December 2017.
|
||||||
|
We're working with CPU vendors and the published papers on
|
||||||
|
these attacks to mitigate them on FreeBSD. Due to the
|
||||||
|
fundamental nature of the attacks, no estimate is yet
|
||||||
|
available for the publication date of patches.</p>
|
||||||
|
</event>
|
||||||
|
</day>
|
||||||
|
</month>
|
||||||
|
|
||||||
|
</year>
|
||||||
|
|
||||||
<year>
|
<year>
|
||||||
<name>2017</name>
|
<name>2017</name>
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue