[Info-vax] Intel x86-64 Processor Design Security Vulnerability?

Johann 'Myrkraverk' Oskarsson johann at myrkraverk.invalid
Thu Jan 4 18:49:58 EST 2018


Craig A. Berry wrote:

> I don't think you can safely say Meltdown is Intel-specific (Spectre
> is definitely not). The Meltdown whitepaper at
> <https://meltdownattack.com/meltdown.pdf> just says that the
> demonstrator exploit didn't initially work on ARM and AMD, speculates
> about some of the reasons that might be the case, and then says that
> "for both ARM and AMD, the toy example as described in Section 3 works
> reliably, indicating that out-of-order execution generally occurs and
> instructions past illegal memory accesses are also performed." In
> other words, exploits for other processors could probably be
> developed, but so far it's only been demonstrated on Intel.

And don't forget that people have a history of fixing exploits so that
the proof-of-concept no longer works, but the vulnerability is still
there in a wider context.

Unfortunately, I don't have a link handy to demonstrate such history.


-- 
Johann | email: invalid -> com | www.myrkraverk.com/blog/
I'm not from the Internet, I just work there. | twitter: @myrkraverk



More information about the Info-vax mailing list