[Info-vax] Intel x86-64 Processor Design Security Vulnerability?

Stephen Hoffman seaohveh at hoffmanlabs.invalid
Sat Jan 6 13:00:18 EST 2018


On 2018-01-05 21:12:55 +0000, DaveFroble said:

> ...Perhaps if anyone copied something, it might have been Intel copying AMD-64?

Multiple sources for parts aren't always a panacea:  
http://seclists.org/fulldisclosure/2018/Jan/12

Akin to what Intel is apparently working toward, AMD is reportedly also 
releasing firmware updates which disable indirect branch prediction 
when executing in kernel mode.

Some related reading on Meltdown and Spectre mitigations: 
https://access.redhat.com/articles/3311301

The Arm cache barrier instruction announcement was entirely unexpected. 
  (Following should be the same whitepaper, hosted at different sites.)

https://armkeil.blob.core.windows.net/developer/Files/pdf/Cache_Speculation_Side-channels.pdf 

https://developer.arm.com/-/media/Files/pdf/Cache_Speculation_Side-channels.pdf?revision=8b5a5f33-c686-4b00-8186-187dd2910355 


The support for the Arm CSDB instruction is apparently already latent 
in the existing and available Arm products! (‽)

We're clearly in for a confusing and bumpy ride as this treadmill 
continues to accelerate.




-- 
Pure Personal Opinion | HoffmanLabs LLC 




More information about the Info-vax mailing list