Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SLAM: Spectre based on Linear Address Masking #478

Open
taggart opened this issue Dec 6, 2023 · 0 comments
Open

SLAM: Spectre based on Linear Address Masking #478

taggart opened this issue Dec 6, 2023 · 0 comments

Comments

@taggart
Copy link

taggart commented Dec 6, 2023

This one is sort of weird, it's a vulnerability that researchers have found in features planned for future CPU designs (but also some existing).

According to the list on the SLAM page:

  • Future Intel CPUs supporting LAM (both 4- and 5-level paging);
  • Future AMD CPUs supporting UAI and 5-level paging;
  • Future Arm CPUs supporting TBI and 5-level paging.
    but also
  • Existing AMD CPUs vulnerable to CVE-2020-12965;

Intel/AMD/ARM have been advised and linux patches are being developed to disable these CPU features until more is known.

But accoding to the above the existing AMD Zen+ and Zen2 may be vulnerable, so SMC should probably report that for those cpus.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant