[MacTUG] Kernel-memory-leaking Intel processor design flaw forces Linux, Windows redesign • The Register
Stephen Markan
smarkan at connect.uwaterloo.ca
Wed Jan 3 16:19:46 EST 2018
https://www.reuters.com/article/us-cyber-intel/intel-working-to-fix-security-flaw-in-its-chips-without-slowing-computers-idUSKBN1ES1BO
-----Original Message-----
From: mactug-bounces at lists.uwaterloo.ca [mailto:mactug-bounces at lists.uwaterloo.ca] On Behalf Of m3griffi
Sent: January-03-18 4:04 PM
To: mactug <mactug at lists.uwaterloo.ca>
Subject: [MacTUG] Kernel-memory-leaking Intel processor design flaw forces Linux, Windows redesign • The Register
"""
Updated to add
The Intel processor flaw is real. A PhD student at the systems and network security group at Vrije Universiteit Amsterdam has developed a proof-of-concept program that exploits the Chipzilla flaw to read kernel memory from user mode:
Bingo! #kpti #intelbug pic.twitter.com/Dml9g8oywk
— brainsmoke (@brainsmoke) January 3, 2018
The Register has also seen proof-of-concept exploit code that leaks a tiny amount of kernel memory to user processes.
Finally, macOS has been patched to counter the chip design blunder since version 10.13.2, according to operating system kernel expert Alex Ionescu. And it appears 64-bit ARM Linux kernels will also get a set of KAISER patches, completely splitting the kernel and user spaces, to block attempts to defeat KASLR. We'll be following up this week.
https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/
"""
_______________________________________________
MacTUG mailing list
MacTUG at lists.uwaterloo.ca
https://lists.uwaterloo.ca/mailman/listinfo/mactug
More information about the MacTUG
mailing list