From owner-freebsd-security@freebsd.org Fri Jan 5 19:53:44 2018 Return-Path: Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 14885EBD0B2; Fri, 5 Jan 2018 19:53:44 +0000 (UTC) (envelope-from fjwcash@gmail.com) Received: from mail-lf0-x234.google.com (mail-lf0-x234.google.com [IPv6:2a00:1450:4010:c07::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 8BBFD7B171; Fri, 5 Jan 2018 19:53:43 +0000 (UTC) (envelope-from fjwcash@gmail.com) Received: by mail-lf0-x234.google.com with SMTP id h137so6244147lfe.8; Fri, 05 Jan 2018 11:53:43 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=ky/ziy21wuNrx6LeM9kDYxphvOfDrWGuamPAcyLFoyQ=; b=d8mikptJfKSgq/Plw56qX0mkSPbAkIBgFcClyMWNHXZXn+wHIce4L6MLc1kzIh62O+ 0q4RdjMmwq59nCzRaOdHKKhiunrexnPIsHgfsBsdgqMGEDIbMeXcq9kH395EiZyBSWMi l5I22tyz+G+c9yLiLd4vHlnYCSKRr67+etdr7aUySD95fsDubjnJ3C27ftXZ/ZfcymuB wozHvReBFr//b6vtFTWDirbR9N7rDg3kwBhRJNh/i/j7a6uVm7epHtYwvbr5zX+Pi9d+ CJqfAvpFSIIOzJ7JEGDb2zNt7fBekkf4t9wPSwcM0zOTUsCdfbqXtDyDUxLhzZNvesPs 8Dqw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=ky/ziy21wuNrx6LeM9kDYxphvOfDrWGuamPAcyLFoyQ=; b=XV2td7OqIzB3pAiVLMF3ZDrAR1t1wWA8F8RCFZdBn7KT1nQucK+Igu1HglVrkzP+Se YG+c8jeQlKIb+Vk2pZ+GuUe1kYF4IERh2suuWfG0Y29rhY39HleWIHWJ3wwn5TuBA/aB FN4a6CW13LKJsVKAeq504l/cfacJiDuR1OxlMyAp3fzjt0zi2NMCrdBehkruDfsTFlVf KPZbRSLuNkrA7qdubBxD/y7gSFpg9Gm52taYZErEINHD1bi9Jzfzmu5U6jjcdqRph/RI KGf7oV3AQkK1Zw2rg/gVfcTJF8SaNAN3Or48aktiwBqt6WOqbU3tDsU498fvLUUCzD9v lYvQ== X-Gm-Message-State: AKGB3mKU7PCS7WU6xVb5/uZ7EQUeeAE/wXUha2jxrM9jOjQ9nvcMZalV 2Q3JbN2Vj7JI09d3sr8FDG0rXAsgNfz1AlO0gUgHweck X-Google-Smtp-Source: ACJfBovbFN+wtgncUsoK8jC9T2axtY4jre5KXApipVpLUMad7mBkpUq+3SkJ9VzkZirFREU+19DtnlSJhitlqJl1FGA= X-Received: by 10.25.42.68 with SMTP id f65mr2037762lfl.25.1515182020362; Fri, 05 Jan 2018 11:53:40 -0800 (PST) MIME-Version: 1.0 Received: by 10.25.163.207 with HTTP; Fri, 5 Jan 2018 11:53:39 -0800 (PST) In-Reply-To: <20180105191145.404BC335@spqr.komquats.com> References: <20180105191145.404BC335@spqr.komquats.com> From: Freddie Cash Date: Fri, 5 Jan 2018 11:53:39 -0800 Message-ID: Subject: Re: Intel hardware bug To: Cy Schubert Cc: Freebsd Security , "freebsd-arch@freebsd.org" , FreeBSD Hackers X-Mailman-Approved-At: Fri, 05 Jan 2018 22:03:15 +0000 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.25 X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 05 Jan 2018 19:53:44 -0000 On Fri, Jan 5, 2018 at 11:11 AM, Cy Schubert wrote: > According to a Red Hat announcement, Power and Series z are also > vulnerable. > =E2=80=8B > =E2=80=8BThere's a lot of confusion in the media, press releases, and annou= ncements due to conflating Spectre and Meltdown. Meltdown (aka CVE-2017-5754) is the issue that affects virtually all Intel CPUs and specific ARM Cortex-A CPUs. This allows read-access to kernel memory from unprivileged processes (ring 3 apps get read access to ring 0 memory).=E2=80=8B IBM POWER, Oracle Sparc, and AMD Zen are not affected by= this issue as they provide proper separation between kernel memory maps and userland memory maps; or they aren't OoO architectures that use speculative execution in this manner. Spectre (aka CVE-2017-5715 and CVE-2017-5753) is the issue that affects all CPUs (Intel, AMD, ARM, IBM, Oracle, etc) and allows userland processes to read memory assigned to other userland processes (but does NOT give access to kernel memory). =E2=80=8BIOW, POWER and Sparc are vulnerable to Spectre, but not vulnerable= to Meltdown. --=20 Freddie Cash fjwcash@gmail.com