Jump to content
3DCoat Forums

Kernel-memory-leaking Intel processor design flaw


ajz3d
 Share

Recommended Posts

AMD processors are not subject to the types of attacks that the kernel page table isolation feature protects against.

The AMD microarchitecture does not allow memory references, including speculative references, that access higher privileged data when running in a lesser privileged mode when that access would result in a page fault.

Link to comment
Share on other sites

  • Advanced Member

I dont agree about the update being shoved down our throats.. It doesnt have much of an impact security wise for regular users.. Malware has to been installed on the PC or someone have local access to it in order to exploit the flaws.. At which point they're already in your system.

Same goes for companies with local data centers (ie: non shared hardware).. 

I think it should be up to us to decide if we want this update.. a possible 30% is a big deal for our data center.. Most servers are already fined tuned and dont have much headroom.. Could cause major outages and costs.

As for my local workstation? Leave my CPU cycles alone and keep your patch!

Anyways, that's my opinion on this whole mess.. 

Link to comment
Share on other sites

  • Member
16 hours ago, Nossgrr said:

I dont agree about the update being shoved down our throats.. It doesnt have much of an impact security wise for regular users.. Malware has to been installed on the PC or someone have local access to it in order to exploit the flaws.. At which point they're already in your system

Really ? AFAIK, these 2 attacks can works with just a webpage, and virtual machine or other security mesures are useless. Do you have more infos on it ?

 

For the 30%, it was one benchmarks on one server with a security fix that slow it down. Most benchmarks for gaming software show no real slowdown. Let's hope the intel patches are good.

Link to comment
Share on other sites

  • Advanced Member

Hi Mr. Panka,

That's the thing, they need to exploit your computer first to gain access.. So in the case you mentioned, they would need to run an exploit (non meltdown related) to gain access to your system and memory.. Only then could they access the cpu prediction bug.

The more scary aspect of this is with hosted companies.. You could technically rent hosted space and then from there, access the Host Server's memory to spy on other tenants on the server. That's how all cloud companies operate so you see how this can be a huge deal there..  Also bear in mind that the information you get is totally random, there's no way to predict what the HOST CPU prediction branches will discard.

 

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

×
×
  • Create New...