Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 5 Jan 2018 11:47:49 -0800
From:      Cy Schubert <Cy.Schubert@cschubert.com>
To:        "K. Macy" <kmacy@freebsd.org>, Cy Schubert <Cy.Schubert@cschubert.com>
Cc:        Eric McCorkle <eric@metricspace.net>,  Jules Gilbert <repeatable_compression@yahoo.com>,  "Ronald F. Guilmette" <rfg@tristatelogic.com>,  Freebsd Security <freebsd-security@freebsd.org>,  Brett Glass <brett@lariat.org>,  =?utf-8?Q?Dag-Erling_Sm=C3=B8rgrav?= <des@des.no>,  Poul-Henning Kamp <phk@phk.freebsd.dk>,  "freebsd-arch@freebsd.org" <freebsd-arch@freebsd.org>,  FreeBSD Hackers <freebsd-hackers@freebsd.org>,  Shawn Webb <shawn.webb@hardenedbsd.org>,  Nathan Whitehorn <nwhitehorn@freebsd.org>
Subject:   RE: Intel hardware bug
Message-ID:  <20180105194743.EAFBB3EA@spqr.komquats.com>

next in thread | raw e-mail | index | archive | help
https://access.redhat.com/security/vulnerabilities/speculativeexecution?sc_=
cid=3D701f2000000tsLNAAY&

---
Sent using a tiny phone keyboard.
Apologies for any typos and autocorrect.
Also, this old phone only supports top post. Apologies.

Cy Schubert
<Cy.Schubert@cschubert.com> or <cy@freebsd.org>
The need of the many outweighs the greed of the few.
---

-----Original Message-----
From: K. Macy
Sent: 05/01/2018 11:37
To: Cy Schubert
Cc: Eric McCorkle; Jules Gilbert; Ronald F. Guilmette; Freebsd Security; Br=
ett Glass; Dag-Erling Sm=C3=B8rgrav; Poul-Henning Kamp; freebsd-arch@freebs=
d.org; FreeBSD Hackers; Shawn Webb; Nathan Whitehorn
Subject: Re: Intel hardware bug

On Fri, Jan 5, 2018 at 11:11 AM, Cy Schubert <Cy.Schubert@cschubert.com> wr=
ote:
> According to a Red Hat announcement, Power and Series z are also vulnerab=
le.
>

Link?


> ---
>
> -----Original Message-----
> From: Eric McCorkle
> Sent: 05/01/2018 04:48
> To: Jules Gilbert; Ronald F. Guilmette; Freebsd Security; Brett Glass; Da=
g-Erling Sm=C3=B8rgrav; Poul-Henning Kamp; freebsd-arch@freebsd.org; FreeBS=
D Hackers; Shawn Webb; Nathan Whitehorn
> Subject: Re: Intel hardware bug
>
> On 01/05/2018 05:07, Jules Gilbert wrote:
>> Sorry guys, you just convinced me that no one, not the NSA, not the FSB,
>> no one!, has in the past, or will in the future be able to exploit this
>> to actually do something not nice.
>
> Attacks have already been demonstrated, pulling secrets out of kernel
> space with meltdown and http headers/passwords out of a browser with
> spectre.  Javascript PoCs are already in existence, and we can expect
> them to find their way into adware-based malware within a week or two.
>
> Also, I'd be willing to bet you a year's rent that certain three-letter
> organizations have known about and used this for some time.
>
>> So what is this, really?, it's a market exploit opportunity for AMD.
>
> Don't bet on it.  There's reports of AMD vulnerabilities, also for ARM.
> I doubt any major architecture is going to make it out unscathed.  (But
> if one does, my money's on Power)
> _______________________________________________
> freebsd-arch@freebsd.org mailing list
> https://lists.freebsd.org/mailman/listinfo/freebsd-arch
> To unsubscribe, send any mail to "freebsd-arch-unsubscribe@freebsd.org"
>
> _______________________________________________
> freebsd-arch@freebsd.org mailing list
> https://lists.freebsd.org/mailman/listinfo/freebsd-arch
> To unsubscribe, send any mail to "freebsd-arch-unsubscribe@freebsd.org"




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20180105194743.EAFBB3EA>