Bugtraq mailing list archives
Intel Pentium Bug: BSDI Releases a patch
From: spike () INDRA COM (Joe Ilacqua)
Date: Tue, 11 Nov 1997 17:36:59 -0700
Apparently the issue can be addressed in software. No details on how it works are provided. ------- Forwarded Message To: bsdi-users () bsdi com Subject: Beta test of Pentium hang work-around for BSD/OS 3.1 (and 3.0) Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Date: Tue, 11 Nov 1997 16:38:48 -0700 From: Jeff Polk <polk () bsdi com> Sender: owner-bsdi-users () mailinglists org Precedence: bulk X-Sender: Jeff Polk <polk () bsdi com> X-UIDL: fb8659ed152bd2ba9912c603b6a1b837 As many of you probably know, a bug was recently discovered in the Pentium CPU that causes the CPU to hang when a certain instruction is executed. This bug has been widely reported in mailing lists and news groups. The bug enables an unprivileged user to hang the system, requiring the system to be reset or power-cycled. With information provided by Intel, BSDI has developed a workaround for this problem. A beta version of the mod for BSD/OS version 3.1 is now available for testing from ftp://ftp.bsdi.com/bsdi/patches/patches-3.1/M310-hangfix This mod may also be applied to 3.0 based systems. The workaround is enabled only on P5 processors, and should not be necessary on Pentium Pro, Pentium II or non-Intel CPUs. The mod is currently available only in binary form. We anticipate general release of the mod within a day or so. We are interested in hearing of any problems experienced with this change. We are also interested in hearing about testing on any non-Intel Pentium-compatible systems. Please send any reports to bsdi-hang-beta () BSDI COM We are not at liberty to discuss the mechanism of the workaround at this time. If you are installing the mod in a source kernel tree, you will need to copy the files sys/i386/OBJ/{machdep.o,locore.o} to your kernel compile directory before rebuilding your kernel. Jeff - -- /\ Jeff Polk Berkeley Software Design, Inc. (BSDI) /\/ \ polk () BSDI COM 5575 Tech Center Dr. #110, Colo Spgs, CO 80919 - -- To unsubscribe from this list, send 'unsubscribe' in the body of an e-mail message to 'bsdi-users-request () mailinglists org' ------- End of Forwarded Message
Current thread:
- Re: Vunerability in Lizards game, (continued)
- Re: Vunerability in Lizards game Zoltan Hidvegi (Nov 18)
- Major Security Flaw in Cybercash 2.1.2 Kerri Kraft (Nov 19)
- IP DOS attacks -- Win95 and WinNT Paul Leach (Nov 18)
- Updating microcode on the fly Superuser (Nov 12)
- Re: Updating microcode on the fly Jyri Kaljundi (Nov 12)
- solaris 251 & syslogd Michael Helm (Nov 12)
- Re: solaris 251 & syslogd Richard Peters (Nov 12)
- Re: solaris 251 & syslogd Dave Kinchlea (Nov 12)
- CERT Advisory CA-97.25 - REVISED- Code Correction Aleph One (Nov 12)
- Bug In Security Dynamics' FTP server (Version 2.2) sp00n (Nov 12)
- Intel Pentium Bug: BSDI Releases a patch Joe Ilacqua (Nov 11)
- Re: Intel Pentium Bug Jason Parsons (Nov 09)
- Re: Intel Pentium Bug Kragen \ (Nov 10)
- Possible solution: [Fwd: I figured out how to make my Pentium Miguel Angel Rodriguez Jodar (Nov 10)
- Re: Intel Pentium Bug Tim Newsham (Nov 10)
- CERT Advisory CA-97.25 - CGI_metachar Aleph One (Nov 10)
- Re: CERT Advisory CA-97.25 - CGI_metachar Greg Bacon (Nov 11)
- L0pht Advisory: IE4.0 Petri Helenius (Nov 10)
- Cisco IOS password encryption facts John Bashinski (Nov 10)
- Re: Cisco IOS password encryption facts ice9 (Nov 11)