On 6/24/2012 12:50 PM, [email protected] wrote:
On Sun, 24 Jun 2012, Harvey Rothenberg wrote:

To All:

Last week, the U.S. Computer Emergency Readiness Team (US-CERT) reported a vulnerability, on Intel CPU hardware, that could lead to a privilege escalation attack on some 64-bit operating systems and virtualization softwares running on Intel CPU hardware.

In these years many security flaws have affected different virtualization platforms but this episode is remarkable because, originated at the CPU level, affects many different systems and not just a single vendor.

Two
days ago US-CERT updated the list of the affected systems, that includes Windows 7, Windows Server 2008 R2, FreeBSD and NetBSD as well as Xen hypervisor, that we report in a ?per Vendor? grouping.
======

Intel
claims that this vulnerability is a software implementation issue, as their processors are functioning as per their documented specifications. However, software that does not take the unsafe SYSRET behavior specific to Intel processors into account may be vulnerable.

I believe that Intel is technically right here, but morally wrong.

Yes, per the letter of the Intel specs, systems with this problem are wrong.

But Intel cloned the AMD64 architecture, and the fact that they do this differently than how AMD does it is really a bug in the Intel implementation.

If the names AMD/Intel were flipped, Intel would be hammering on how AMD was a faulty clone and nobody should trust their chips.

David Lang

Agreed. Interestingly, this was picked up several years ago with Linux, and patched it then: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0744 Surprised it took 6 years for people to wonder if it would affect other operating systems, it rather strikes me as something people may well have been using for years as an exploit angle.
_______________________________________________
Discuss mailing list
[email protected]
https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
http://lopsa.org/

Reply via email to