On 6/24/2012 12:50 PM, [email protected] wrote:
On Sun, 24 Jun 2012, Harvey Rothenberg wrote:
To All:
Last week, the U.S. Computer Emergency Readiness Team (US-CERT)
reported a vulnerability, on Intel CPU hardware, that could lead to a
privilege escalation attack on some 64-bit operating systems and
virtualization softwares running on Intel CPU hardware.
In these years many security flaws have affected different
virtualization platforms but this episode is remarkable because,
originated at the CPU level, affects many different systems and not
just a single vendor.
Two
days ago US-CERT updated the list of the affected systems, that
includes Windows 7, Windows Server 2008 R2, FreeBSD and NetBSD as
well as Xen hypervisor, that we report in a ?per Vendor? grouping.
======
Intel
claims that this vulnerability is a software implementation issue, as
their processors are functioning as per their documented specifications.
However, software that does not take the unsafe SYSRET behavior
specific to Intel processors into account may be vulnerable.
I believe that Intel is technically right here, but morally wrong.
Yes, per the letter of the Intel specs, systems with this problem are
wrong.
But Intel cloned the AMD64 architecture, and the fact that they do
this differently than how AMD does it is really a bug in the Intel
implementation.
If the names AMD/Intel were flipped, Intel would be hammering on how
AMD was a faulty clone and nobody should trust their chips.
David Lang
Agreed. Interestingly, this was picked up several years ago with Linux,
and patched it then:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0744
Surprised it took 6 years for people to wonder if it would affect other
operating systems, it rather strikes me as something people may well
have been using for years as an exploit angle.
_______________________________________________
Discuss mailing list
[email protected]
https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
http://lopsa.org/