[TUHS] OT: critical Intel design flaw
Random832
random832 at fastmail.com
Thu Jan 4 00:22:23 AEST 2018
On Wed, Jan 3, 2018, at 06:57, Ron Natalie wrote:
> I think it’s much ado about nothing. In fact, nearly the same bug
> cropped up in the 386 and we had to hack around it in UNIX then (in the
> 32 bit pentiums you can use one of the segment registers to provide a
> second layer of security over paging. Alas, this doesn’t work on the
> 64 bit addressing mode).
To my understanding, what's leaking is the addresses (and possibly physical addresses), which are in turn usable in a "rowhammer"-style attack - something that didn't exist (or wasn't known, anyway) in the 386 era.
More information about the TUHS
mailing list