[coreboot] Remote security exploit in all 2008+ Intel platforms

Timothy Pearson tpearson at raptorengineering.com
Mon May 1 22:42:23 CEST 2017


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 05/01/2017 03:32 PM, Trammell Hudson wrote:
> On Mon, May 01, 2017 at 05:13:10PM +0100, Sam Kuper wrote:
>> Has anyone here got a link describing or including the fix, either
>> directly from Intel, or from an OEM?
> 
> Intel just posted one:
> 
> https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr
> 

So it's confirmed then.  Our decision to avoid ME-enabled systems even
at higher cost was just validated...

As an unofficial poll, if POWER server hardware were ever to come down
in price to more reasonable levels, would you consider switching given
the vulnerabilities in Intel hardware?  Similarly, on the consumer side
would you consider switching to ARM or is x86 gaming / <insert closed
source application here> too important?

- -- 
Timothy Pearson
Raptor Engineering
+1 (415) 727-8645 (direct line)
+1 (512) 690-0200 (switchboard)
https://www.raptorengineering.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJZB52tAAoJEK+E3vEXDOFb0U8H/i5Pgufe0aymGqa0xl2b7qTr
yUZkF9Q6LIESqmi09kFvRtfTjh/IbrZraY3CrxzSU31Yt1/7jylQvoecp2LfKDKV
sC2CsQBOkp8Ywq2gqmMigJyCBEo2pKIYp4u1gmHicQsLHEkiv+o+jAJariToLyuO
lcAYOgdAsa9U2rOcxS3lnNjqhIMCXG17UgSRMzq6XFZ4K6NhffFvKnLcJwLynyud
YRbgFg17cW/FneckMZnFXMI/POg6LwA+HwyOcAojBd49WMwulK2W7qfR8MQ8bJOu
9+CkbmyNuKDJs4K7G5N8CKlkjp+5n1Dr/UgH4KOXnwF6OL1W7juGuVZ8cnhXX4M=
=kVlW
-----END PGP SIGNATURE-----



More information about the coreboot mailing list