Intel responds, it's not a bug!:
https://newsroom.intel.com/news/intel-responds-to-security-research-findings/
https://newsroom.intel.com/news/intel-responds-to-security-research-findings/
Intel responds, it's not a bug!:
https://newsroom.intel.com/news/intel-responds-to-security-research-findings/
Very concerning times with these hardware exploits. All I can say is.. this is going to turn out well for AMD.
Highly unlikely.Well the ceo of Intel sold a lot of his stock on nov. 29th. So that transaction will be investigated I guess. And 2018 will be a good year for AMD.
I don't believe that the caches other than the TLB are flushed. With the kernel no longer in the page tables the speculative load bug would not be able to modify the caches with kernel data anymore.
A a TLB miss requires 4 extra memory access for a total of 5 in 64-bit long mode for a 4K page. That's why this hurts performance so much.
So my impression for now:
1. scan the virtual address space with increments of about half kernel size.
2. as soon as mapped memory has been found, find its start/end addresses
3. Finally walk through the kernel memory and retrieve the interesting things (accounts, certs, ...)
chmod +r /dev/kmem
is just as effective.AMD is vulnerable to only 1 of the 3 attacks. The one that needs the PTI fix, which is the one with the big performance hit, is not it. And so far only FX and the APU chips are shown to be vulnerable to that one.although Intel is implying that they are not immune
I wonder whether Microsoft will make an exception and issue a security fix for discontinued Windows XP and 7, as they did when there was this thing which allowed to take over Windows PCs with a single IP packet.In effect,chmod +r /dev/kmem
is just as effective.
I have a similiar feeling.I feel it is more like to find a way to also deep imply AMD in the thing.
Demonstrated here using the Firefox password wallet as example. (another tweet from the guy lebarondemerde linked to)They can even use this attack to read memory from a different process, breaking process isolation. So yeah, this is a real nasty bug.
Strange they didn't update their site but they did release a statement: https://www.cnbc.com/2018/01/03/amd-rebukes-intel-says-flaw-poses-near-zero-risk-to-its-chips.html
This vulnerability was originally scheduled to be made public on 9
January. It was accelerated at the request of the discloser due to
one of the issues being made public.
We believe that ARM is affected, but unfortunately due to the
accelerated schedule, we haven't been able to get concrete input from
ARM. We are asking ARM and will publish more information when it is
available.