|
Message-ID: <CAHmME9rcGJxPYBsgg7H_G46vPgmo30AUgK5C4-bJjubvrPv9+Q@mail.gmail.com> Date: Tue, 4 Aug 2015 14:21:23 +0200 From: "Jason A. Donenfeld" <Jason@...c4.com> To: oss-security <oss-security@...ts.openwall.com> Cc: "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org> Subject: Re: Linux x86_64 NMI security issues On Wed, Jul 22, 2015 at 8:12 PM, Andy Lutomirski <luto@...capital.net> wrote: > You can mitigate CVE-2015-3290 by blocking modify_ldt or > perf_event_open using seccomp. A fully-functional, portable, reliable > exploit is privately available and will be published in a week or two. > *Patch your systems* Andy -- we've been sitting at the edge of our seats in anticipation! Is it publication time yet? Jason
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.