[Golem] Technical deep dive Meltdown + Spectre [was: Re: Calendario giugno 2018]

Dario Faggioli raistlin@linux.it
Ven 15 Giu 2018 09:23:03 CEST


On Thu, 2018-06-14 at 11:43 +0200, Dario Faggioli wrote:
> On Thu, 2018-05-31 at 21:18 +0200, giomba wrote:
> > - 12 giugno - Technical deep dive Meltdown + Spectre: funzionamento
> > a
> > basso livello delle recenti vulnerabilità dei processori Intel
> > 
> A proposito di questo, grazie per la serata, personalmente mi son
> divertito! :-)
> 
> Mi rendo conto, riguardando i link (che postero` qui appena ho un
> secondo), che alcune cose son state spiegate in modo un po'
> approssimativo... spero almeno di essere riuscito ad ottenere un
> compromesso decente fra rendere le cose comprensibili a tutti e dare
> informazioni tecnicamente esatte ed accurate. :-D
> 
Ed ecco i link.

Concetti base (piu` che altro via Wikipedia... c'e` tantissimo altro
materiale in altri siti/contenitori... cercate sul Web).

* Virtual Memory:
  https://en.wikipedia.org/wiki/Virtual_address_space
  https://wiki.osdev.org/Memory_management
* Speculative execution:
  https://en.wikipedia.org/wiki/Speculative_execution
  https://en.wikipedia.org/wiki/Branch_predictor
  https://en.wikipedia.org/wiki/Instruction_pipelining
* Tomasulo algorithm:
  https://en.wikipedia.org/wiki/Tomasulo_algorithm
* Cache(s):
  https://en.wikipedia.org/wiki/CPU_cache
  https://www.extremetech.com/extreme/188776-how-l1-and-l2-cpu-caches-work-and-why-theyre-an-essential-part-of-modern-chips
* TLB:
  https://en.wikipedia.org/wiki/Translation_lookaside_buffer
* Side-channels attacks
  https://en.wikipedia.org/wiki/Side-channel_attack

Meltdown e Spectre.

* Info generali:
  https://meltdownattack.com/
  https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)
  http://blog.cyberus-technology.de/posts/2018-01-03-meltdown.html
  https://www.redhat.com/en/blog/what-are-meltdown-and-spectre-heres-what-you-need-know
* Advisories:
  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
  https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
  http://xenbits.xen.org/xsa/advisory-254.html
  https://blog.xenproject.org/2018/01/22/xen-project-spectre-meltdown-faq-jan-22-update/
* Risposte distro:
  https://www.suse.com/support/kb/doc/?id=7022512
  https://www.suse.com/support/kb/doc/?id=7022514
  https://access.redhat.com/security/vulnerabilities/speculativeexecution
  https://blog.ubuntu.com/2018/01/24/meltdown-spectre-and-ubuntu-what-you-need-to-know
* Checker e POC:
  https://github.com/speed47/spectre-meltdown-checker
  https://www.maketecheasier.com/check-linux-meltdown-spectre-vulnerability/
  https://github.com/cloudsriseup/Meltdown-Proof-of-Concept
  https://github.com/mniip/spectre-meltdown-poc
* Spiegazioni con esempi:
  https://www.raspberrypi.org/blog/why-raspberry-pi-isnt-vulnerable-to-spectre-or-meltdown/
  https://medium.com/@mattklein123/meltdown-spectre-explained-6bc8634cc0c2

Ciao,
Dario
-- 
<<This happens because I choose it to happen!>> (Raistlin Majere)
-----------------------------------------------------------------
Dario Faggioli, Ph.D, http://about.me/dario.faggioli
Software Engineer @ SUSE https://www.suse.com/
-------------- parte successiva --------------
Un allegato non testuale è stato rimosso....
Nome:        signature.asc
Tipo:        application/pgp-signature
Dimensione:  833 bytes
Descrizione: This is a digitally signed message part
URL:         <http://lists.linux.it/pipermail/golem/attachments/20180615/703f4289/attachment.sig>


Maggiori informazioni sulla lista golem