Jailer
Not strong, but bad
- Joined
- Sep 12, 2014
- Messages
- 4,977
Of course they did, their stock is taking a hit.....Intel posts an arse-covering press release a few moments ago...
Last edited by a moderator:
Of course they did, their stock is taking a hit.....Intel posts an arse-covering press release a few moments ago...
AMD responded to Intel's not-so-subtle nudge that AMD's processors were also susceptible: https://www.barrons.com/articles/amd-says-near-zero-risk-to-its-chips-1515016135
And now the cat is out of the bag:
http://www.zdnet.com/article/securi...el-chip-since-1995-arm-processors-vulnerable/
https://spectreattack.com/
Which systems are affected by Meltdown?
Desktop, Laptop, and Cloud computers may be affected by Meltdown. More technically, every Intel processor which implements out-of-order execution is potentially affected, which is effectively every processor since 1995 (except Intel Itanium and Intel Atom before 2013). We successfully tested Meltdown on Intel processor generations released as early as 2011. Currently, we have only verified Meltdown on Intel processors. At the moment, it is unclear whether ARM and AMD processors are also affected by Meltdown.
Which systems are affected by Spectre?
Almost every system is affected by Spectre: Desktops, Laptops, Cloud Servers, as well as Smartphones. More specifically, all modern processors capable of keeping many instructions in flight are potentially vulnerable. In particular, we have verified Spectre on Intel, AMD, and ARM processors.
Small sigh of relief: Meltdown does not compromise the hypervisor in VMs.
It is a small sigh. "The boss can't make hide nor hair of these metric booby traps" small."compromise"? Well that's kind of playing with words.
https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
For anyone that's interested, Kris posted a comment on the FreeNAS subreddit in regards to these exploits.
Well, Meltdown is a straightforward "hey, load the address given by whatever's at this other address" scheme that results in many non-AMD CPUs actually going far enough to load it into cache, regardless of whether it's meant to be accessible. It's then leaked from the cache by a timing attack.It sounds like Meltdown is OS-patch only(or new chips), while Spectre has partial microcode fix and some recompiling to use special instructions to protect areas of code vulnerable to branch prediction analysis.
I think the difference between the two is that meltdown is stealing data at rest, while Spectre is analyzing the more fluid behavior of instructions in another process. So, change the instructions.