Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756288AbbHDMVb (ORCPT ); Tue, 4 Aug 2015 08:21:31 -0400 Received: from frisell.zx2c4.com ([192.95.5.64]:43619 "EHLO frisell.zx2c4.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756065AbbHDMV2 (ORCPT ); Tue, 4 Aug 2015 08:21:28 -0400 MIME-Version: 1.0 In-Reply-To: References: Date: Tue, 4 Aug 2015 14:21:23 +0200 Message-ID: Subject: Re: [oss-security] Linux x86_64 NMI security issues From: "Jason A. Donenfeld" To: oss-security Cc: "linux-kernel@vger.kernel.org" Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 656 Lines: 15 On Wed, Jul 22, 2015 at 8:12 PM, Andy Lutomirski wrote: > You can mitigate CVE-2015-3290 by blocking modify_ldt or > perf_event_open using seccomp. A fully-functional, portable, reliable > exploit is privately available and will be published in a week or two. > *Patch your systems* Andy -- we've been sitting at the edge of our seats in anticipation! Is it publication time yet? Jason -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/