VOGONS


Intel CPU design flaw - Kernel-memory-leaking

Topic actions

Reply 20 of 31, by r.cade

User metadata
Rank Member
Rank
Member

It looks like it would be very hard to set up a circumstance that could use these exploits, especially remotely. If you have to be on the machine as root to do it, then you are already on the machine as root. You would have to have intimate knowledge of the specific machine configuration and be quite adept at kernel programming it would seem.

Reply 21 of 31, by squiggly

User metadata
Rank Member
Rank
Member
r.cade wrote:

It looks like it would be very hard to set up a circumstance that could use these exploits, especially remotely. If you have to be on the machine as root to do it, then you are already on the machine as root. You would have to have intimate knowledge of the specific machine configuration and be quite adept at kernel programming it would seem.

Err...Mozilla has already confirmed they are exploitable with Javascript. And you don't have to be root - the whole point of speculative execution is it will try and execute instructions you aren't supposed to - then swallow the fault as in the real world you didn't *actually* execute them at all.

Reply 22 of 31, by r.cade

User metadata
Rank Member
Rank
Member

There is something in the wild already? How on Earth would Javascript have access to kernel code and memory?

Reply 23 of 31, by squiggly

User metadata
Rank Member
Rank
Member
r.cade wrote:

There is something in the wild already? How on Earth would Javascript have access to kernel code and memory?

It doesn't. That's why they are called side-channel attacks. You speculatively try and execute something you *don't* have access to, the fault is swallowed by the branch prediction engine, and you can then try and infer some information from changes to processor cache, TLB, page tables, etc.

Intel just released an analysis that looks like a good analysis of the issue: https://newsroom.intel.com/wp-content/uploads … de-Channels.pdf

Reply 24 of 31, by nforce4max

User metadata
Rank l33t
Rank
l33t

All I can say that is on part of the people who made this possible is GG WP, how in hell could this go on unnoticed for what 23 years?

On a far away planet reading your posts in the year 10,191.

Reply 25 of 31, by squiggly

User metadata
Rank Member
Rank
Member
nforce4max wrote:

All I can say that is on part of the people who made this possible is GG WP, how in hell could this go on unnoticed for what 23 years?

It's an incredibly ingenious exploit. It seems that the whole concept of side-channel attacks against the fundamental architecture is relatively new. How did rowhammer go unnoticed for even longer?

There are probably a ton of other thing we haven't thought of yet still waiting to be discovered. This is why IT security is a relatively safe career choice 😉

Reply 26 of 31, by Joey_sw

User metadata
Rank Oldbie
Rank
Oldbie

i wonder if the old Cyrix CPU also affected by this? after all they're the one which uses OoOE before intel also decided to adopt that approach.

-fffuuu

Reply 27 of 31, by Anaxagoras

User metadata
Rank Newbie
Rank
Newbie

Is not a bug is a feature! 🤣
Falling in the conspiranoia it sounds a CIA/NSA/FBI/???* backdoor 😎

My computers

qp92nk-6.png

Reply 28 of 31, by gerwin

User metadata
Rank l33t
Rank
l33t

I don't think it is practical enough to be such a backdoor in any case (intel management engine anyone?). Maybe it fits as a subtile way of planned product obsolescence instead. 🙄 But they have to step it up a little, because I see no reason to ditch things for the home user using safe browsing plugins.

--> ISA Soundcard Overview // Doom MBF 2.04 // SetMul

Reply 29 of 31, by Stojke

User metadata
Rank l33t
Rank
l33t

AyyMD right now

untitled.png

Note | LLSID | "Big boobs are important!"

Reply 30 of 31, by spiroyster

User metadata
Rank Oldbie
Rank
Oldbie
Stojke wrote:

AyyMD right now

untitled.png

Not really

You mean itanium/RPi users?

Reply 31 of 31, by F2bnp

User metadata
Rank l33t
Rank
l33t
Stojke wrote:

AyyMD right now

untitled.png

I died from laughter. Thanks for that 🤣 .