[MacTUG] Kernel-memory-leaking Intel processor design flaw forces Linux, Windows redesign • The Register

Stephen Markan smarkan at connect.uwaterloo.ca
Wed Jan 3 16:19:46 EST 2018


https://www.reuters.com/article/us-cyber-intel/intel-working-to-fix-security-flaw-in-its-chips-without-slowing-computers-idUSKBN1ES1BO


-----Original Message-----
From: mactug-bounces at lists.uwaterloo.ca [mailto:mactug-bounces at lists.uwaterloo.ca] On Behalf Of m3griffi
Sent: January-03-18 4:04 PM
To: mactug <mactug at lists.uwaterloo.ca>
Subject: [MacTUG] Kernel-memory-leaking Intel processor design flaw forces Linux, Windows redesign • The Register

"""
Updated to add

The Intel processor flaw is real. A PhD student at the systems and network security group at Vrije Universiteit Amsterdam has developed a proof-of-concept program that exploits the Chipzilla flaw to read kernel memory from user mode:

     Bingo! #kpti #intelbug pic.twitter.com/Dml9g8oywk
     — brainsmoke (@brainsmoke) January 3, 2018

The Register has also seen proof-of-concept exploit code that leaks a tiny amount of kernel memory to user processes.

Finally, macOS has been patched to counter the chip design blunder since version 10.13.2, according to operating system kernel expert Alex Ionescu. And it appears 64-bit ARM Linux kernels will also get a set of KAISER patches, completely splitting the kernel and user spaces, to block attempts to defeat KASLR. We'll be following up this week.

https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/
"""
_______________________________________________
MacTUG mailing list
MacTUG at lists.uwaterloo.ca
https://lists.uwaterloo.ca/mailman/listinfo/mactug



More information about the MacTUG mailing list