Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Saturday February 16 2019, @02:08PM   Printer-friendly
from the so-that-means...-we-are-screwed dept.
 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2, Interesting) by Curlsman on Monday February 18 2019, @08:55PM

    by Curlsman (7337) on Monday February 18 2019, @08:55PM (#803173)

    Alpha EV6 (21264) used out-of order execution:
    https://people.cs.clemson.edu/~mark/464/21264.verification.pdf [clemson.edu]
    "The Alpha 21264 microprocessor is a highly out-of-order, superscalar implementation of the Alpha architecture."

    And https://en.wikipedia.org/wiki/DEC_Alpha [wikipedia.org]

    And the OpenVMS OS designers believe they are resistant:
    https://www.vmssoftware.com/updates.html [vmssoftware.com]
    "VSI OpenVMS is NOT vulnerable to this issue, primarily due to its different, four-mode architecture. Specifically, VSI OpenVMS is protected against CVE-2018-8897 because it does two things differently than other operating systems:

    1) OpenVMS doesn’t rely on the CS pushed in the interrupt stack frame to determine the previous mode. This means OpenVMS cannot be tricked into believing it was already in kernel mode when it was not, which is central to this vulnerability.

    2) OpenVMS uses a different method to switch GSBASE; OpenVMS always performs the switch and makes sure the user-mode GSBASE is always updated to match the kernel-mode GSBASE."

    Starting Score:    1  point
    Moderation   +1  
       Interesting=1, Total=1
    Extra 'Interesting' Modifier   0  

    Total Score:   2