OpenBSD and FreeBSD released Meltdown and Specter patches

OpenBSD

More than a month after the infamous Meltdown and Specter vulnerabilities were exposed, multiple BSD system branches, including FreeBSD and OpenBSD, finally announced a patch consolidation that successfully fixed the issue. FreeBSD said last month that security experts at Google’s Project Zero team, Graz University of Technology, Cyberus Technology and others, were exposed after the exposure of the two vulnerabilities and threatened the timely mobilization of the team to repair the BSD branch system.

 

The project team with Intel, AMD, and other CPU manufacturers to work closely with efforts to integrate Specter and Meltdown on FreeBSD two loopholes patch, but the team did not release the patch specific on-line time. After a month and a half of waiting, the PTI vulnerability patch was officially launched today and PTI’s PCID was optimized.

In addition, FreeBSD released a kernel update that includes the IBRS (Indirect Branch Limit Inference) feature, which largely alleviates the specter vulnerabilities more difficult than Meltdown. The loophole will continue to have a negative impact in the coming years, and researchers hope that the problem will be solved thoroughly by more advanced means.

On the other hand, a UNIX-like system known for its security and encryption features OpenBSD recently received a patch that fixes the Meltdown security vulnerability. The update log does not indicate a bug in the specter, but I believe it should also be released in the near future.

If you are using OpenBSD or FreeBSD, update your system as soon as possible to protect your device from Meltdown and Specter vulnerabilities.

Source: Softpedia