Re: [Test-Announce] Call for testing: updates to address today's CPU/kernel vulnerability

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2018-01-03 at 19:04 -0700, stan wrote:
> On Thu, 4 Jan 2018 09:23:58 +0800
> Ed Greshko <ed.greshko@xxxxxxxxxxx> wrote:
> 
> > And how about
> > https://www.windowscentral.com/all-modern-processors-impacted-new-meltdown-and-spectre-exploits ; 
> > ?
> 
> My comments were directed at Meltdown (formerly called Kaiser, now
> called kopti). I saw nothing about spectre, so I will have to do more
> research about that.

I'd say focusing on specific exploits/CVEs here is sort of missing the
forest for the trees. This is really a case of an entire optimization
technique being fundamentally vulnerable to exploitation. The details
of what specific exploit variants have been successfully developed so
far are really only an implementation detail, it'd be silly to assume
the ones that have been disclosed so far are all that will ever be
(indeed, RH's disclosure on this explicitly states that there are known
exploits on ppc and s390 which have not yet been given CVEs and catchy
nicknames).
-- 
Adam Williamson
Fedora QA Community Monkey
IRC: adamw | Twitter: AdamW_Fedora | XMPP: adamw AT happyassassin . net
http://www.happyassassin.net
_______________________________________________
test mailing list -- test@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to test-leave@xxxxxxxxxxxxxxxxxxxxxxx




[Index of Archives]     [Fedora Desktop]     [Fedora SELinux]     [Photo Sharing]     [Yosemite Forum]     [KDE Users]

  Powered by Linux