This article: 
https://googleprojectzero.blogspot.be/2018/01/reading-privileged-memory-with-side.html

Mentions the following:

> Additional exploits for other architectures are also known to exist. These
> include IBM System Z,  POWER8 (Big Endian and Little Endian), and POWER9
> (Little Endian).

The attacks target flaws in the hardware, in this case related to speculative
execution. But the PoCs I'm seeing so far seem to be meant to leak Linux kernel
memory (leaking passwords/cryptographic keys). The z/Architecture also
employs speculative execution and branch prediction.

So I'm not sure whether or not there is a working PoC for any Linux distribution
running either Linux native, under z/VM or KVM on System Z, and I cannot find
anything about a PoC for z/OS either.

If the attack can be used against z/OS, I'd wager it could leak fetch-protected
memory that is addressable by the address space in the first place. How much
interesting information there is in fetch-protected storage, I do not know.

-
Jan

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to