2018 is not Starting off well - Intel CPUs Expose Kernel Contents to Users

Intel was saying "hey, it's not just us, everybody does it."
If an AMD processor encounters an instruction with higher privilege, it doesn't execute it in anticipation of getting permission and that's the whole point. It takes longer but in the long run it doesn't risk exposing the result of the privileged instruction.

I should note that this is mostly of concern to enterprises that engage in cloud computing where elements of a computer are shared with other enterprises. The sad part is that many of these enterprises use the same perversions of Windows so standalone users suffer the performance consequences (unless their antivirus solution prevents installation of the "mitigation") as collateral damage.
 
Saw that xkcd took on explaining the Spectre and Meltdown vulnerability:
meltdown_and_spectre.png

(New zero-day vulnerability: In addition to rowhammer, it turns out lots of servers are vulnerable to regular hammers, too.)

Apple released macOS 10.13.2 which patches around the Spectre exploit. Also, iOS 11.2.2 for A-series devices.
 
  • Like
Reactions: TheKrell

FOUND A NEW TOOL, love it, and its free

Designing A New Build

Users Who Are Viewing This Thread (Total: 0, Members: 0, Guests: 0)

Who Read This Thread (Total Members: 1)

Latest posts