Page 1 of 1

Meltdown & Spectre – Intel, AMD and ARM CPUs vulnerable

Posted: Wed Jan 03, 2018 7:30 pm
by Roman
That Intel-specific bug and now these cross-platform two... I just have no words.

https://meltdownattack.com
https://googleprojectzero.blogspot.com/ ... -side.html
In addition to violating process isolation boundaries using native code, Spectre attacks can also be used to violate browser sandboxing, by mounting them via portable JavaScript code. We wrote a JavaScript program that successfully reads data from the address space of the browser process running it.

Re: Meltdown & Spectre – Intel, AMD and ARM CPUs vulnerable

Posted: Wed Jan 03, 2018 7:53 pm
by ~
Roman wrote:That Intel-specific bug and now these cross-platform two... I just have no words.

https://meltdownattack.com
https://googleprojectzero.blogspot.com/ ... -side.html
In addition to violating process isolation boundaries using native code, Spectre attacks can also be used to violate browser sandboxing, by mounting them via portable JavaScript code. We wrote a JavaScript program that successfully reads data from the address space of the browser process running it.
Wouldn't it be enough to invalidate the entire cache every time we switch/enter/exit/terminate/create a process or thread? Or just disabling the CPU cache entirely for security-critical machines?

It seems to me that the intention is just having a cache that is separated for each process (instead of the existing one which is global to the CPU/computer) so there is no possibility to read leftover cached data between arbitrary processes.

Re: Meltdown & Spectre – Intel, AMD and ARM CPUs vulnerable

Posted: Thu Jan 04, 2018 12:58 am
by iansjack
Try that in your OS and see what happens. I'd expect a massive performance hit.

Re: Meltdown & Spectre – Intel, AMD and ARM CPUs vulnerable

Posted: Thu Jan 04, 2018 1:23 am
by Solar
It's a hot topic, but please try to keep it together.

http://forum.osdev.org/viewtopic.php?f= ... ff#p281534

Re: Meltdown & Spectre – Intel, AMD and ARM CPUs vulnerable

Posted: Sun Jan 07, 2018 3:57 am
by ggodw000
since this one is in ramblings, may be can be reserved for non-technical, political aspect of it.
The whole things looks like some publicity stunt.