Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <824d0fa7-8068-4a06-9185-58b25eb4c678@oracle.com>
Date: Tue, 5 Dec 2023 12:59:57 -0800
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
Subject: SLAM: Spectre based on Linear Address Masking

A vulnerability in closed source CPUs which open source OSes may need
to mitigate was disclosed today:

https://www.vusec.net/projects/slam/
https://github.com/vusec/slam
https://www.youtube.com/watch?v=y4wZ-tREaNk
https://x.com/vu5ec/status/1732099516621521003

The first page lists these processors as affected:

    - Existing AMD CPUs vulnerable to CVE-2020-12965;
    - Future Intel CPUs supporting LAM (both 4- and 5-level paging);
    - Future AMD CPUs supporting UAI and 5-level paging;
    - Future Arm CPUs supporting TBI and 5-level paging.

as it takes advantage of CPU features which allow masking off some bits of
pointer addresses to store additional data in, such as Intel’s Linear Address
Masking (LAM), AMD’s Upper Address Ignore (UAI), or ARM's Top-byte Ignore (TBI).

-- 
         -Alan Coopersmith-                 alan.coopersmith@...cle.com
          Oracle Solaris Engineering - https://blogs.oracle.com/solaris

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.