News
news China's Chilling 'Social Credit System' Is Straight Out of Dystopian Sci-Fi
news UFO 'death ray' made Korean War GIs sick
news The Haunted States of America
news When the Supernatural Feeds on Us
news Russian space agency says space station hole was deliberate sabotage
news Biblical end of days prophecy COMES TRUE as fish swim again in Dead Sea
news 1950s Science Kit Had Real Uranium
news We're Probably Living in a Simulation, Elon Musk Says
news It’s Now Possible To Telepathically Communicate with a Drone Swarm
news New material to 'speed spacecraft to 134,000,000 mph'
news The future of food: what we’ll eat in 2028


Username:
Password: or Register
 
Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5

Processor flaw exposes 20 years of devices to new attack!
CyberDan
Registered User
User ID: kaput
01-04-2018 01:51 AM

Posts: 3,423



Post: #1
shocked1 Processor flaw exposes 20 years of devices to new attack!
Advertisement
Time to switch to AMD processors...They do not have this flaw.

https://www.theverge.com/2018/1/3/168468...acos-linux

doomed

https://www.theverge.com/2018/1/3/168468...acos-linux
Quote this message in a reply
LoP Guest
lop guest
User ID: 1337
01-04-2018 01:52 AM

 



Post: #2
RE: Processor flaw exposes 20 years of devices to new attack!
Shameless attempt to get people to buy AMD.

Intel is superior.
Quote this message in a reply
LunaC
¯\_(ツ)_/¯
User ID: 1337
01-04-2018 01:54 AM

Posts: 4,645



Post: #3
RE: Processor flaw exposes 20 years of devices to new attack!
From the very article you posted
Quote:AMD has denied any of its processors are vulnerable, although Google researchers say they’ve demonstrated a successful attack on AMD’s FX and PRO CPUs. ARM has also confirmed that its Cortex-A processors are vulnerable.
I'll get to 20 soon enough but maybe somebody will get my back on this

Fléctere Si Néqueo Súperos Acheronta Movebo
Quote this message in a reply
CyberDan
Registered User
User ID: 1337
01-04-2018 01:55 AM

Posts: 3,423



Post: #4
RE: Processor flaw exposes 20 years of devices to new attack!
LunaC  Wrote: (01-04-2018 01:54 AM)
From the very article you posted
Quote:AMD has denied any of its processors are vulnerable, although Google researchers say they’ve demonstrated a successful attack on AMD’s FX and PRO CPUs. ARM has also confirmed that its Cortex-A processors are vulnerable.
I'll get to 20 soon enough but maybe somebody will get my back on this

Not on the newest ones.
Quote this message in a reply
LunaC
¯\_(ツ)_/¯
User ID: 1337
01-04-2018 02:07 AM

Posts: 4,645



Post: #5
RE: Processor flaw exposes 20 years of devices to new attack!
CyberDan  Wrote: (01-04-2018 01:55 AM)
LunaC  Wrote: (01-04-2018 01:54 AM)
From the very article you posted
I'll get to 20 soon enough but maybe somebody will get my back on this

Not on the newest ones.

I'll wait for proof in the pudding but I'm not here to argue with an AMD fanboy on the new ryzen. The benefit of the architecture is above and beyond 95% of what most people, even gamers, utilize in the current market. Nothing intel won't catch up to considering some concepts I've seen.
#And yes, I said catch up to. Intel is certainly cozy in their place at the top but AMD is giving them a good run for their money.

Fléctere Si Néqueo Súperos Acheronta Movebo
(This post was last modified: 01-04-2018 02:12 AM by LunaC.) Quote this message in a reply
UnAcceptance
Registered User
User ID: 1337
01-04-2018 02:20 AM

Posts: 1,189



Post: #6
RE: Processor flaw exposes 20 years of devices to new attack!
Seems to look much llike the post made before this one called Intel....oops.
Quote this message in a reply
LunaC
¯\_(ツ)_/¯
User ID: 1337
01-04-2018 02:22 AM

Posts: 4,645



Post: #7
RE: Processor flaw exposes 20 years of devices to new attack!
UnAcceptance  Wrote: (01-04-2018 02:20 AM)
Seems to look much llike the post made before this one called Intel....oops.

Flashy title.
[Image: giphy.gif]
1dunno1

Fléctere Si Néqueo Súperos Acheronta Movebo
Quote this message in a reply
cingularity
Registered User
User ID: 1337
01-04-2018 02:23 AM

Posts: 294



Post: #8
RE: Processor flaw exposes 20 years of devices to new attack!
You see, these companies unknowingly hire NSA agents. And they put this code in.
Quote this message in a reply
FreeFlow staff
Follow da docta !!!
User ID: 5
01-04-2018 02:26 AM

Posts: 2,272



Post: #9
RE: Processor flaw exposes 20 years of devices to new attack!
LoP Guest  Wrote: (01-04-2018 01:52 AM)
Shameless attempt to get people to buy AMD.

Intel is superior.

What more do they want ?
They already have over 85 % of the market

Here's why:
https://timeline.com/sophie-scholl-white...3901042c98
And here:
https://en.wikipedia.org/wiki/Empress_El...of_Austria
And this:
https://en.wikipedia.org/wiki/Louis_XVII_of_France
Quote this message in a reply
LoP Guest
lop guest
User ID: 1337
01-04-2018 03:44 AM

 



Post: #10
RE: Processor flaw exposes 20 years of devices to new attack!
It is understood the bug is present in modern Intel processors produced in the past decade. It allows normal user programs – from database applications to JavaScript in web browsers – to discern to some extent the layout or contents of protected kernel memory areas.

The fix is to separate the kernel's memory completely from user processes using what's called Kernel Page Table Isolation, or KPTI. At one point, Forcefully Unmap Complete Kernel With Interrupt Trampolines, aka FUCKWIT, was mulled by the Linux kernel team, giving you an idea of how annoying this has been for the developers.

-------

In an email to the Linux kernel mailing list over Christmas, AMD said it is not affected. The wording of that message, though, rather gives the game away as to what the underlying cockup is:

AMD processors are not subject to the types of attacks that the kernel page table isolation feature protects against. The AMD microarchitecture does not allow memory references, including speculative references, that access higher privileged data when running in a lesser privileged mode when that access would result in a page fault.

A key word here is "speculative." Modern processors, like Intel's, perform speculative execution. In order to keep their internal pipelines primed with instructions to obey, the CPU cores try their best to guess what code is going to be run next, fetch it, and execute it.

It appears, from what AMD software engineer Tom Lendacky was suggesting above, that Intel's CPUs speculatively execute code potentially without performing security checks. It seems it may be possible to craft software in such a way that the processor starts executing an instruction that would normally be blocked – such as reading kernel memory from user mode – and completes that instruction before the privilege level check occurs.

That would allow ring-3-level user code to read ring-0-level kernel data. And that is not good.

-------

Also, the updates to separate kernel and user address spaces on Linux are based on a set of fixes dubbed the KAISER patches, which were created by eggheads at Graz University of Technology in Austria. These boffins discovered [PDF] it was possible to defeat KASLR by extracting memory layout information from the kernel in a side-channel attack on the CPU's virtual memory system. The team proposed splitting kernel and user spaces to prevent this information leak, and their research sparked this round of patching.

Their work was reviewed by Anders Fogh, who wrote this interesting blog post in July. That article described his attempts to read kernel memory from user mode by abusing speculative execution. Although Fogh was unable to come up with any working proof-of-concept code, he noted:

My results demonstrate that speculative execution does indeed continue despite violations of the isolation between kernel mode and user mode.

----
https://www.theregister.co.uk/2018/01/02...sign_flaw/


there.
Quote this message in a reply
Dr. Woo

User ID: 53145
01-04-2018 03:47 AM

Posts: 548



Post: #11
RE: Processor flaw exposes 20 years of devices to new attack!
link doesn't work for me
Quote this message in a reply
LoP Guest
lop guest
User ID: 1337
01-04-2018 03:47 AM

 



Post: #12
RE: Processor flaw exposes 20 years of devices to new attack!
Updated to add

The Intel processor flaw is real. A PhD student at the systems and network security group at Vrije Universiteit Amsterdam has developed a proof-of-concept program that exploits the Chipzilla flaw to read kernel memory from user mode:

https://www.theregister.co.uk/2018/01/02...sign_flaw/
Quote this message in a reply
LoP Guest
lop guest
User ID: 1337
01-04-2018 03:50 AM

 



Post: #13
RE: Processor flaw exposes 20 years of devices to new attack!
LoP Guest  Wrote: (01-04-2018 01:52 AM)
Shameless attempt to get people to buy AMD.

Intel is superior.

Both are fine - thing is smashing a Windows OS apart to shamelessly work similar to Fedora is the way forward.
Quote this message in a reply
LoP Guest
lop guest
User ID: 1337
01-04-2018 03:54 AM

 



Post: #14
RE: Processor flaw exposes 20 years of devices to new attack!
AMD rebukes Intel, says flaw poses 'near-zero risk' to its chips

https://www.cnbc.com/2018/01/03/amd-rebu...chips.html
Quote this message in a reply
LoP Guest
lop guest
User ID: 1337
01-04-2018 03:59 AM

 



Post: #15
RE: Processor flaw exposes 20 years of devices to new attack!
LoP Guest  Wrote: (01-04-2018 03:47 AM)
Updated to add

The Intel processor flaw is real. A PhD student at the systems and network security group at Vrije Universiteit Amsterdam has developed a proof-of-concept program that exploits the Chipzilla flaw to read kernel memory from user mode:

https://www.theregister.co.uk/2018/01/02...sign_flaw/

Oh the FEAR lol. How about just returning the favor enabling a line-of-sight straight back to the hacker? It is not hard exploit X-Forward using simple tools via CMD tracert and GEOIPTool. Use NetSat or nip over to Princeton IP Locator.

https://www.net.princeton.edu/static-ip.html

https://www.net.princeton.edu/traceroute.html

Thank me later - your friendly neighborhood 3011 Whitehatman
Quote this message in a reply
Advertisement









Contact UsConspiracy Forum. No reg. required! Return to TopReturn to ContentRSS Syndication