tech-kern archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: amd64: svs



On Sun, Jan 07, 2018 at 12:26:00PM +0900, clare%csel.org@localhost wrote:
[..]

> The Redhat and Microsoft implicitly says "Intel will release microcode
> soon".  I hoped to it.
> 
> the Linux supported by the google goes to the KPTI, maybe,
> it means the Intel does not plan to mitigate by the new microcode.

According to [1] Intel had known about issue for months:

 Variants of this issue are known to affect many modern processors,
 including certain processors by Intel, AMD and ARM. For a few Intel and
 AMD CPU models, we have exploits that work against real software. We
 reported this issue to Intel, AMD and ARM on 2017-06-01 [1].

Lack of already available microcode updates, lack of release dates for
particular cores and that all PR (mis)statements from Intel makes me 
doubt about Intel's will and ability to control situation. Few days
ago even hardware manufacturers, like Cisco[2] wasn't sure about impact
of bug (so - no early disclosure from Intel at all, even for them?).
Today Cisco released additional informations - but take a look at "fix 
release date" for UCS Servers[2]! 


1 - https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
2 - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel

-- 
Piotr 'aniou' Meyer


Home | Main Index | Thread Index | Old Index