Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 6 Jan 2018 11:55:11 -0800
From:      John-Mark Gurney <jmg@funkthat.com>
To:        Freddie Cash <fjwcash@gmail.com>
Cc:        Freebsd Security <freebsd-security@freebsd.org>, FreeBSD Hackers <freebsd-hackers@freebsd.org>, "freebsd-arch@freebsd.org" <freebsd-arch@freebsd.org>
Subject:   Re: Intel hardware bug
Message-ID:  <20180106195510.GH75576@funkthat.com>
In-Reply-To: <CAOjFWZ6cJ8C%2BhuRukZ39pW%2B7dkfZmZaC81YkXS6OovX9PB6XbQ@mail.gmail.com>
References:  <20180105191145.404BC335@spqr.komquats.com> <CAOjFWZ6cJ8C%2BhuRukZ39pW%2B7dkfZmZaC81YkXS6OovX9PB6XbQ@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Freddie Cash wrote this message on Fri, Jan 05, 2018 at 11:53 -0800:
> Spectre (aka CVE-2017-5715 and CVE-2017-5753) is the issue that affects all
> CPUs (Intel, AMD, ARM, IBM, Oracle, etc) and allows userland processes to
> read memory assigned to other userland processes (but does NOT give access
> to kernel memory).

No, Spectre does not allow one userland process to read another userland
process's memory..  It allows an attacker to read any memory within the
same process..

-- 
  John-Mark Gurney				Voice: +1 415 225 5579

     "All that I will do, has been done, All that I have, has not."



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20180106195510.GH75576>