'Kernel memory leaking' Intel bug
Posted: Wed Jan 03, 2018 12:00 pm
https://www.theregister.co.uk/2018/01/0 ... sign_flaw/
All my computers are Intel (i5-2500K, i7-4810HQ).
https://twitter.com/TheRegister/status/ ... wsrc%5EtfwIt appears, from what AMD software engineer Tom Lendacky was suggesting above, that Intel's CPUs speculatively execute code potentially without performing security checks. It seems it may be possible to craft software in such a way that the processor starts executing an instruction that would normally be blocked – such as reading kernel memory from user mode – and completes that instruction before the privilege level check occurs.
That would allow ring-3-level user code to read ring-0-level kernel data. And that is not good.
All my computers are Intel (i5-2500K, i7-4810HQ).