Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Red Badger
It was the speculative code branching that did them in, because it was coded carelessly.

From the Register article:

It appears, from what AMD software engineer Tom Lendacky was suggesting above, that Intel's CPUs speculatively execute code potentially without performing security checks. It seems it may be possible to craft software in such a way that the processor starts executing an instruction that would normally be blocked – such as reading kernel memory from user mode – and completes that instruction before the privilege level check occurs.

That would allow ring-3-level user code to read ring-0-level kernel data. And that is not good.


33 posted on 01/03/2018 2:56:22 PM PST by steve86 (Prophecies of Maelmhaedhoc O'Morgair (Latin form: Malachy))
[ Post Reply | Private Reply | To 1 | View Replies ]


To: steve86

You’d think that after all these years - they’d know that.


54 posted on 01/03/2018 4:45:15 PM PST by AFreeBird
[ Post Reply | Private Reply | To 33 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson