Date: Mon, 9 Mar 2015 23:14:30 +0300 (MSK) From: Dmitry Morozovsky <marck@rinet.ru> To: Poul-Henning Kamp <phk@phk.freebsd.dk> Cc: freebsd-security@FreeBSD.org Subject: Re: DRAM Rowhammer exploits Message-ID: <alpine.BSF.2.00.1503092309570.38285@woozle.rinet.ru> In-Reply-To: <91440.1425930724@critter.freebsd.dk> References: <alpine.BSF.2.00.1503092248580.38285@woozle.rinet.ru> <91440.1425930724@critter.freebsd.dk>
next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 9 Mar 2015, Poul-Henning Kamp wrote: > >any thoughts we're vulnerable to this? > > It's a hardware problem, *everybody* are vulnerable. Well, it seems I used somewhat incorrect wordings. Any chance we could provide workaround like for Pentium f00f bug? Actually I doubt it as cache flush commands do not seem to be avoidable -- but I would like to hear from real security experts.... -- Sincerely, D.Marck [DM5020, MCK-RIPE, DM3-RIPN] [ FreeBSD committer: marck@FreeBSD.org ] ------------------------------------------------------------------------ *** Dmitry Morozovsky --- D.Marck --- Wild Woozle --- marck@rinet.ru *** ------------------------------------------------------------------------
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?alpine.BSF.2.00.1503092309570.38285>
