Gentoo Archives: gentoo-hardened

From: "Tóth Attila" <atoth@××××××××××.hu>
To: gentoo-hardened@l.g.o
Subject: [gentoo-hardened] Re: [gentoo-hardened] Any hardened features to protect from CVE-2016–5195 like vulnerabilities?
Date: Mon, 05 Dec 2016 07:45:13
Message-Id: 0b9d5a84fc7bbae47f3031c721e55ebd.squirrel@atoth.sote.hu
In Reply to: [gentoo-hardened] Any hardened features to protect from CVE-2016–5195 like vulnerabilities? by Andrew Savchenko
1 2016.December 5.(H) 07:39 időpontban Andrew Savchenko ezt írta:
2 > 3) Can some hardware features like Intel TSX be used to protect
3 > from such race conditions?
4
5 Just a sidenote on TSX: although it sounds procmising, I've been seeing
6 multiple reports on Intel disabling the feature on several processors by
7 microcode update due to various bugs since its debut. Not just some
8 Haswell and Broadwell, but also some Skylake prcoessors are involved as
9 well.
10
11 https://en.wikipedia.org/wiki/Transactional_Synchronization_Extensions
12 "In August 2014, Intel announced that a bug exists in the TSX
13 implementation on Haswell, Haswell-E, Haswell-EP and early Broadwell CPUs,
14 which resulted in disabling the TSX feature on affected CPUs via a
15 microcode update.[9][10][21] The bug was fixed in F-0 steppings of the
16 vPro-enabled Core M-5Y70 Broadwell CPU in November 2014.[22]"
17
18 https://www.reddit.com/r/hardware/comments/44k218/intel_disables_tsx_transactional_memory_again_in/
19
20 BR: Dw.
21 --
22 dr Tóth Attila, Radiológus, 06-20-825-8057
23 Attila Toth MD, Radiologist, +36-20-825-8057

Replies