Talk about anything and everything related or unrelated to the FreeOrion project, especially Strategy Games.
- Vacuum Dragon
- Posts: 665
- Joined: Mon Apr 10, 2017 4:25 pm
https://www.theregister.co.uk/2018/01/0 ... sign_flaw/
https://twitter.com/TheRegister/status/ ... wsrc%5Etfw
It appears, from what AMD software engineer Tom Lendacky was suggesting above, that Intel's CPUs speculatively execute code potentially without performing security checks. It seems it may be possible to craft software in such a way that the processor starts executing an instruction that would normally be blocked – such as reading kernel memory from user mode – and completes that instruction before the privilege level check occurs.
That would allow ring-3-level user code to read ring-0-level kernel data. And that is not good.
All my computers are Intel (i5-2500K, i7-4810HQ).
- Release Manager, Design
- Posts: 4609
- Joined: Wed Nov 16, 2011 12:56 pm
- Location: Sol III
I assume you refer to the "spectre" and "meltdown" expoits? Because these, as far as I understand, are not an Intel only problem...
- Space Kraken
- Posts: 112
- Joined: Sun Nov 19, 2017 6:32 pm
Vezzra wrote:I assume you refer to the "spectre" and "meltdown" expoits? Because these, as far as I understand, are not an Intel only problem...
meltdown, from what i've read, is pretty much intel only. (one arm chip is affected and possibly some other vendors outside of the "big 3")
spectre has a broader impact.