Hi Jerry
About why Intel is vulnerable to Meltdown and AMD, while Intel basically
licensed the x64 instruction set from AMD the actual implementation of
those instructions is completely different.
The instruction set for x86 and x64 is targeted at Complex Instruction
Set Computers (CISCs) h
Hi,
When applying fixes to IllumOS/OpenIndiana to fix the Meltdown
vulnerability forcing the separation of Kernel Memory from User Memory
into separate Memory spaces, please make sure that the code detects the
CPU type. My Dual AMD CPUs are not susceptible the Meltdown so I do not
want to tak
-0800
> Subject: Re: [OpenIndiana-discuss] Intel hardware
> To: Discussion list for OpenIndiana ,
> "Tim Mooney" >
> On 01/ 4/18 01:32 PM, Tim Mooney wrote:
> > Intel's "Newsroom" response page is pretty terrible, in that regard.
> >
>
On 01/ 4/18 01:32 PM, Tim Mooney wrote:
> Intel's "Newsroom" response page is pretty terrible, in that regard.
>
>
> https://newsroom.intel.com/news/intel-responds-to-security-research-findings/
Intel posted statements with a little more detail after the embargo broke:
https://security-cent
In regard to: Re: [OpenIndiana-discuss] Intel hardware, Richard L. Hamilton...:
Given how broadly Spectre might be applicable, I'm surprised that
there's no mention of at least investigating the possibilities on CPUs
other than Intel, AMD, and ARM - like SPARC, Power, or for that
Thanks for the info Russell.
I'm curious about the AMD thing though. My understand had always been that Intel had purchased/leased/whatever acquired the x86 64
bit extensions from AMD. Maybe its all the difference between the "meltdown" and the "spectre" vulnerability though.
Sparc, unless
Hi,
Lots of information, out there after the embargo was partially lifted
(all the details have not been revealed).
https://www.forbes.com/sites/thomasbrewster/2018/01/04/google-microsoft-apple-updates-for-meltdown-spectre-intel-processor-vulnerabilities/#7ed5f9c95c3
Meltdown which breaks the
> On Jan 4, 2018, at 14:21, Nemo wrote:
>
> On 4 January 2018 at 13:45, cpforum wrote:
> [..]
>> The only really secure solution : replace your CPU !
>
> Do you mean to sparc?
>
> N.
While Meltdown may be specific to Intel, I would not assume that SPARC would be
immune to Spectre. Perh
On 4 January 2018 at 13:45, cpforum wrote:
[..]
> The only really secure solution : replace your CPU !
Do you mean to sparc?
N.
___
openindiana-discuss mailing list
openindiana-discuss@openindiana.org
https://openindiana.org/mailman/listinfo/openind
attack breading
predictive cache of the processor to get information of others process seems to
be non trivial.
> Message du 03/01/18 17:41
> De : "Bob Friesenhahn"
> A : "Discussion list for OpenIndiana"
> Copie à :
> Objet : Re: [OpenIndiana-discuss
On Wed, 3 Jan 2018, cpforum wrote:
Are IllumOS and Solaris affected at the same level than Linux and Windows ?
If the privileged information was disclosed to someone under the terms
of the embargo, are you expecting them to reveal this information on
the list in advance of the embargo expiri
11 matches
Mail list logo