Difference between revisions of "Speculative Execution Vulnerabilities of 2018"

From RCS Wiki
Jump to navigation Jump to search
(Page for inevitable Meltdown/Spectre questions, especially since Spectre is something OpenPOWER programmers will need to be aware of.)
 
(moving to references, adding known vulnerable architectures)
Line 14: Line 14:
 
| Meltdown
 
| Meltdown
 
|}
 
|}
 +
 +
At this time we know that [[POWER9|POWER9]], [[POWER8|POWER8]], [[POWER8E|POWER8E]], POWER7+, POWER6, and certain PowerPC architectures are affected. <ref>IBM PSIRT Blog post, [https://www.ibm.com/blogs/psirt/potential-impact-processors-power-family/ Potential Impact on Processors in the POWER family]</ref><ref>TenFourFox Development blog post, [https://tenfourfox.blogspot.co.at/2018/01/actual-field-testing-of-spectre-on.html Actual field testing of Spectre on various Power Macs]</ref><ref>Raptor Engineering GNU Social [https://social.raptorengineering.io/conversation/731 notices about POWER8 and POWER9 vulnerability]</ref>
  
 
== External Links ==
 
== External Links ==
  
 
* Websites for [https://meltdownattack.com/ Meltdown] and [https://spectreattack.com/ Spectre] are currently the same
 
* Websites for [https://meltdownattack.com/ Meltdown] and [https://spectreattack.com/ Spectre] are currently the same
* IBM PSIRT Blog post [https://www.ibm.com/blogs/psirt/potential-impact-processors-power-family/ Potential Impact on Processors in the POWER family]
+
 
* Raptor Engineering GNU Social [https://social.raptorengineering.io/conversation/731 notices about POWER vulnerability]
+
== References ==
 +
 
 +
<references/>

Revision as of 23:12, 8 January 2018

In January of 2018, news of three speculative execution vulnerabilities was made public.

CVE Group
CVE-2017-5715 Spectre
CVE-2017-5753 Spectre
CVE-2017-5754 Meltdown

At this time we know that POWER9, POWER8, POWER8E, POWER7+, POWER6, and certain PowerPC architectures are affected. [1][2][3]

External Links

References