On Thu, Apr 5, 2018 at 9:19 AM, Aham Brahmasmi <[email protected]>
wrote:

> Hello Misc,
>
> Will OpenBSD's patches for Spectre help mitigate the risk for the
> processor families which are not receiving Intel's mitigation microcode
> for Spectre/Spectre variant 2?
>
> Backdrop
> Intel has issued a Microcode Revision Guidance on April 3, 2018 [1].
> As per this guidance, some processor families will not be receiving
> the Spectre/Spectre variant 2 mitigation microcode updates from Intel.
> The reasons for this kind act of benevolence are best known to Intel.
>
> The above is my understanding based on TheRegister's article[2]. As a
> layman who understands little to nothing about Spectre or Meltdown, I
> am wondering whether OpenBSD's mitigations would be sufficient.
>
> On a side note, older IBM-era ThinkPads seem to be left out by Intel.
> ThinkPad Classic is/was for volks with lot of money. Lenovo wants to be
> Apple. I do not have words to express myself.
>
> Regards,
> ab
> [1] - https://newsroom.intel.com/wp-content/uploads/sites/11/2018/
> 04/microcode-update-guidance.pdf
> [2] - http://www.theregister.co.uk/2018/04/04/intel_spectre_
> microcode_updates/
> ---------|---------|---------|---------|---------|---------|---------|--
>
>
Sir Brahmasmi:

>From http://www.openbsd.org/63.html
- What's New
-- section - Security improvements:

OpenBSD/arm64 now uses kernel page table isolation to mitigate Spectre
variant 3 (Meltdown) attacks.

OpenBSD/armv7 and OpenBSD/arm64 now flush the Branch Target Buffer (BTB) on
processors that do speculative execution to mitigate Spectre variant 2
attacks.

-- 
Boyd Stephens

Reply via email to