[Info-vax] Intel x86-64 Processor Design Security Vulnerability?
Johann 'Myrkraverk' Oskarsson
johann at myrkraverk.invalid
Thu Jan 4 18:49:58 EST 2018
Craig A. Berry wrote:
> I don't think you can safely say Meltdown is Intel-specific (Spectre
> is definitely not). The Meltdown whitepaper at
> <https://meltdownattack.com/meltdown.pdf> just says that the
> demonstrator exploit didn't initially work on ARM and AMD, speculates
> about some of the reasons that might be the case, and then says that
> "for both ARM and AMD, the toy example as described in Section 3 works
> reliably, indicating that out-of-order execution generally occurs and
> instructions past illegal memory accesses are also performed." In
> other words, exploits for other processors could probably be
> developed, but so far it's only been demonstrated on Intel.
And don't forget that people have a history of fixing exploits so that
the proof-of-concept no longer works, but the vulnerability is still
there in a wider context.
Unfortunately, I don't have a link handy to demonstrate such history.
--
Johann | email: invalid -> com | www.myrkraverk.com/blog/
I'm not from the Internet, I just work there. | twitter: @myrkraverk
More information about the Info-vax
mailing list