-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Hi,
I've been reading lately about this attack: https://github.com/xoreaxeaxeax/sinkhole
Some summary articles: * http://www.theregister.co.uk/2015/08/11/memory_hole_roots_intel_processors * http://www.bit-tech.net/news/hardware/2015/08/07/x86-security-flaw/1
My basic question is: are coreboot systems affected by this vulnerability, and if so, what work is being done to patch it?
Specifically, in my case, I am interested in the following coreboot systems: * i945 platforms (Lenovo X60/T60, Macbook2,1) * GM45 platforms (Lenovo X200/T400/T500/R400/R500) * fam10h AMD platforms (ASUS KFSN4-DRE, ASUS KGPE-D16)
Could someone shed a light on this?
Regards, Francis Rowe.
2015-08-12 16:28 GMT+02:00 Francis Rowe info@gluglug.org.uk:
My basic question is: are coreboot systems affected by this vulnerability, and if so, what work is being done to patch it?
I reviewed our SMM handler, drafted out how to mitigate any potential issue and started work on a PoC. Then got distracted by something else.
My test system is the getac/p470 (i945, core2duo CPU)
Specifically, in my case, I am interested in the following coreboot
systems:
- i945 platforms (Lenovo X60/T60, Macbook2,1)
- GM45 platforms (Lenovo X200/T400/T500/R400/R500)
- fam10h AMD platforms (ASUS KFSN4-DRE, ASUS KGPE-D16)
Totally different architecture, I'm not sure if the APIC decoding behavior even translates to that.
Patrick