[Info-vax] Intel x86-64 Processor Design Security Vulnerability?

DaveFroble davef at tsoft-inc.com
Tue Jan 2 22:01:07 EST 2018


Simon Clubley wrote:
> On 2018-01-02, Stephen Hoffman <seaohveh at hoffmanlabs.invalid> wrote:
>> There's speculation around a potential security vulnerability and 
>> related information embargo, involving various Intel x86-64 processors, 
>> in the implementations of memory management and speculative execution.
>>
>> http://pythonsweetness.tumblr.com/post/169166980422/the-mysterious-case-of-the-linux-page-table 
>>
> 
> Some more reading:
> 
> https://en.wikipedia.org/wiki/Kernel_page-table_isolation
> 
> Of course, VMS hasn't even got as far as implementing KASLR (or even
> traditional ASLR) yet...
> 
>> https://lkml.org/lkml/2017/12/27/2
>> https://www.tugraz.at/en/tu-graz/services/news-stories/planet-research/singleview/article/wenn-rowhammer-nur-noch-einmal-klopft/ 
>>
> 
> From the last link:
> 
> |When a system is regarded as absolutely safe, our curiosity is awakened,.
> |explains Daniel Gruss from the Institute of Applied Information Processing and
> |Communication Technology
> 
>> Etc.
>>
>> The issue appears specific to Intel x86-64 designs, and does not arise 
>> in the AMD x86-64 designs.
>>
> 
> If this is what it sounds like, I wonder if a microkernel based operating
> system would be more protected against this than a monolithic operating
> system would be ?
> 
> Simon.
> 

What does that matter in c.o.v?  VSI is porting the OS, not re-writing it.

-- 
David Froble                       Tel: 724-529-0450
Dave Froble Enterprises, Inc.      E-Mail: davef at tsoft-inc.com
DFE Ultralights, Inc.
170 Grimplin Road
Vanderbilt, PA  15486



More information about the Info-vax mailing list