I don't see the reference to System Z in the article. Am I missing something?

Charles


-----Original Message-----
From: IBM Mainframe Discussion List [mailto:[email protected]] On Behalf 
Of Cannaerts, Jan
Sent: Thursday, January 4, 2018 2:11 AM
To: [email protected]
Subject: Re: Intel Chip flaw

This article: 
https://googleprojectzero.blogspot.be/2018/01/reading-privileged-memory-with-side.html

Mentions the following:

> Additional exploits for other architectures are also known to exist. 
> These include IBM System Z,  POWER8 (Big Endian and Little Endian), 
> and POWER9 (Little Endian).

The attacks target flaws in the hardware, in this case related to speculative 
execution. But the PoCs I'm seeing so far seem to be meant to leak Linux kernel 
memory (leaking passwords/cryptographic keys). The z/Architecture also employs 
speculative execution and branch prediction.

So I'm not sure whether or not there is a working PoC for any Linux 
distribution running either Linux native, under z/VM or KVM on System Z, and I 
cannot find anything about a PoC for z/OS either.

If the attack can be used against z/OS, I'd wager it could leak fetch-protected 
memory that is addressable by the address space in the first place. How much 
interesting information there is in fetch-protected storage, I do not know.

-
Jan

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
[email protected] with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to