Date: Tue, 4 Aug 2015 14:21:23 +0200 From: "Jason A. Donenfeld" <Jason@...c4.com> To: oss-security <oss-security@...ts.openwall.com> Cc: "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org> Subject: Re: Linux x86_64 NMI security issues On Wed, Jul 22, 2015 at 8:12 PM, Andy Lutomirski <luto@...capital.net> wrote: > You can mitigate CVE-2015-3290 by blocking modify_ldt or > perf_event_open using seccomp. A fully-functional, portable, reliable > exploit is privately available and will be published in a week or two. > *Patch your systems* Andy -- we've been sitting at the edge of our seats in anticipation! Is it publication time yet? Jason
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ