[Info-vax] Intel x86-64 Processor Design Security Vulnerability?

Simon Clubley clubley at remove_me.eisner.decus.org-Earth.UFP
Tue Jan 2 13:24:24 EST 2018


On 2018-01-02, Stephen Hoffman <seaohveh at hoffmanlabs.invalid> wrote:
>
> There's speculation around a potential security vulnerability and 
> related information embargo, involving various Intel x86-64 processors, 
> in the implementations of memory management and speculative execution.
>
> http://pythonsweetness.tumblr.com/post/169166980422/the-mysterious-case-of-the-linux-page-table 
>

Some more reading:

https://en.wikipedia.org/wiki/Kernel_page-table_isolation

Of course, VMS hasn't even got as far as implementing KASLR (or even
traditional ASLR) yet...

> https://lkml.org/lkml/2017/12/27/2
> https://www.tugraz.at/en/tu-graz/services/news-stories/planet-research/singleview/article/wenn-rowhammer-nur-noch-einmal-klopft/ 
>

>From the last link:

|When a system is regarded as absolutely safe, our curiosity is awakened,.
|explains Daniel Gruss from the Institute of Applied Information Processing and
|Communication Technology

> Etc.
>
> The issue appears specific to Intel x86-64 designs, and does not arise 
> in the AMD x86-64 designs.
>

If this is what it sounds like, I wonder if a microkernel based operating
system would be more protected against this than a monolithic operating
system would be ?

Simon.

-- 
Simon Clubley, clubley at remove_me.eisner.decus.org-Earth.UFP
Microsoft: Bringing you 1980s technology to a 21st century world



More information about the Info-vax mailing list