On Sun, 24 Jun 2012, Harvey Rothenberg wrote:

To All:

Last week, the U.S. Computer Emergency Readiness Team (US-CERT) reported a vulnerability, on Intel CPU hardware, that could lead to a privilege escalation attack on some 64-bit operating systems and virtualization softwares running on Intel CPU hardware.

In these years many security flaws have affected different virtualization platforms but this episode is remarkable because, originated at the CPU level, affects many different systems and not just a single vendor.

Two
days ago US-CERT updated the list of the affected systems, that includes Windows 7, Windows Server 2008 R2, FreeBSD and NetBSD as well as Xen hypervisor, that we report in a ?per Vendor? grouping.
======

Intel
claims that this vulnerability is a software implementation issue, as their processors are functioning as per their documented specifications. However, software that does not take the unsafe SYSRET behavior specific to Intel processors into account may be vulnerable.

I believe that Intel is technically right here, but morally wrong.

Yes, per the letter of the Intel specs, systems with this problem are wrong.

But Intel cloned the AMD64 architecture, and the fact that they do this differently than how AMD does it is really a bug in the Intel implementation.

If the names AMD/Intel were flipped, Intel would be hammering on how AMD was a faulty clone and nobody should trust their chips.

David Lang
_______________________________________________
Discuss mailing list
[email protected]
https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
 http://lopsa.org/
_______________________________________________
Discuss mailing list
[email protected]
https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to