Page 1 of 1

'Kernel memory leaking' Intel bug

Posted: Wed Jan 03, 2018 12:00 pm
by Oberlus
https://www.theregister.co.uk/2018/01/0 ... sign_flaw/

It appears, from what AMD software engineer Tom Lendacky was suggesting above, that Intel's CPUs speculatively execute code potentially without performing security checks. It seems it may be possible to craft software in such a way that the processor starts executing an instruction that would normally be blocked – such as reading kernel memory from user mode – and completes that instruction before the privilege level check occurs.

That would allow ring-3-level user code to read ring-0-level kernel data. And that is not good.
https://twitter.com/TheRegister/status/ ... wsrc%5Etfw

:? :evil:

All my computers are Intel (i5-2500K, i7-4810HQ).

Re: 'Kernel memory leaking' Intel bug

Posted: Sun Jan 07, 2018 9:29 am
by Vezzra
I assume you refer to the "spectre" and "meltdown" expoits? Because these, as far as I understand, are not an Intel only problem...

Re: 'Kernel memory leaking' Intel bug

Posted: Sun Jan 07, 2018 9:33 am
by alleryn
Vezzra wrote:I assume you refer to the "spectre" and "meltdown" expoits? Because these, as far as I understand, are not an Intel only problem...
meltdown, from what i've read, is pretty much intel only. (one arm chip is affected and possibly some other vendors outside of the "big 3")

spectre has a broader impact.