Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 9 Mar 2015 23:14:30 +0300 (MSK)
From:      Dmitry Morozovsky <marck@rinet.ru>
To:        Poul-Henning Kamp <phk@phk.freebsd.dk>
Cc:        freebsd-security@FreeBSD.org
Subject:   Re: DRAM Rowhammer exploits
Message-ID:  <alpine.BSF.2.00.1503092309570.38285@woozle.rinet.ru>
In-Reply-To: <91440.1425930724@critter.freebsd.dk>
References:  <alpine.BSF.2.00.1503092248580.38285@woozle.rinet.ru> <91440.1425930724@critter.freebsd.dk>

next in thread | previous in thread | raw e-mail | index | archive | help

On Mon, 9 Mar 2015, Poul-Henning Kamp wrote:

> >any thoughts we're vulnerable to this?
> 
> It's a hardware problem, *everybody* are vulnerable.

Well, it seems I used somewhat incorrect wordings.

Any chance we could provide workaround like for Pentium f00f bug?

Actually I doubt it as cache flush commands do not seem to be avoidable -- but 
I would like to hear from real security experts....

-- 
Sincerely,
D.Marck                                     [DM5020, MCK-RIPE, DM3-RIPN]
[ FreeBSD committer:                                 marck@FreeBSD.org ]
------------------------------------------------------------------------
*** Dmitry Morozovsky --- D.Marck --- Wild Woozle --- marck@rinet.ru ***
------------------------------------------------------------------------



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?alpine.BSF.2.00.1503092309570.38285>