[Info-vax] Intel x86-64 Processor Design Security Vulnerability?
Stephen Hoffman
seaohveh at hoffmanlabs.invalid
Sat Jan 6 13:00:18 EST 2018
On 2018-01-05 21:12:55 +0000, DaveFroble said:
> ...Perhaps if anyone copied something, it might have been Intel copying AMD-64?
Multiple sources for parts aren't always a panacea:
http://seclists.org/fulldisclosure/2018/Jan/12
Akin to what Intel is apparently working toward, AMD is reportedly also
releasing firmware updates which disable indirect branch prediction
when executing in kernel mode.
Some related reading on Meltdown and Spectre mitigations:
https://access.redhat.com/articles/3311301
The Arm cache barrier instruction announcement was entirely unexpected.
(Following should be the same whitepaper, hosted at different sites.)
https://armkeil.blob.core.windows.net/developer/Files/pdf/Cache_Speculation_Side-channels.pdf
https://developer.arm.com/-/media/Files/pdf/Cache_Speculation_Side-channels.pdf?revision=8b5a5f33-c686-4b00-8186-187dd2910355
The support for the Arm CSDB instruction is apparently already latent
in the existing and available Arm products! (‽)
We're clearly in for a confusing and bumpy ride as this treadmill
continues to accelerate.
--
Pure Personal Opinion | HoffmanLabs LLC
More information about the Info-vax
mailing list