Originally posted by cen1
View Post
Announcement
Collapse
No announcement yet.
More Linux Kernel & GCC Patches Come Out In The Wake Of Spectre+Meltdown
Collapse
X
-
Originally posted by Kayote View Postcan someone test if disabling branch prediction hurts cpu mining??Michael Larabel
https://www.michaellarabel.com/
- Likes 1
Comment
-
Microsoft released a powershell script to check if you have the meltdown/spectre updates https://support.microsoft.com/en-us/...erabilities-in
What updates are needed on LInux
kernel > 4.14.11, 4.15rc6 (check)
updated ucode intel, ucode amd, kernel firmware (check)
what else is necessary?Last edited by Kayote; 05 January 2018, 08:17 PM.
Comment
-
Spectre does not require shared memory mappings and is not limited to just within the current process. Spectre is an attack which tricks the victim into speculatively executing code within its own memory domain in a way that allows the attacker to figure out the contents of memory in the Victim's domain. The attacker accomplishes this by passing data to the victim through normal APIs and by massaging data and branch caches such that it can detect whether the speculative execution occurred or not via timing.
So there are only really three requirements for a Spectre attack: (1) A normal API / IPC mechanism to communicate with the victim, and (2) Knowledge of code paths in the victim that might be vulnerable to speculative execution based on arguments and data the Attacker supplies through the API / IPC mechanism, and (3) That the code the victim winds up executing speculatively can be leveraged by the attacker's arguments to address any memory location within the Victim's address space.
The most common spectre attack that we are likely to see in the near future will be a Javascript attack against the browser. This is indeed an attack that stays within the process. It's the easiest Spectre attack vector so that is what we are likely to see first. But Spectre itself is not limited to just the current process.
If you use chrome, use the experimental --site-per-process option to reduce the impact.
-Matt
Comment
-
Originally posted by InsideJob View Post100%
Comment
Comment