The next intel "Emmental cheese"-lake should probably just use the Intel 14nm++++++++++++++++++++++++++++++++++++++++++++(c )(tm) manufacturing process and just place isolated "thoroughly" scrubbed "secure" cpu pentium 3 cores and throw in a fpga cpu core in case things like this happen.
Security Researchers Detail New "BlindSide" Speculative Execution Attack
Collapse
X
-
Last edited by onlyLinuxLuvUBack; 11 September 2020, 05:10 PM. Reason: swiss-lake may not be worldwide understoood
-
-
Originally posted by Spam View PostIs this attack even plausible? Seems it is dependent on other faults first?
But once that happens with this trick you can bypass kernel address randomization and get through, while without this bug the kernel randomization would stop you from abusing a memory corruption bug.
Comment
-
-
Originally posted by tildearrow View PostRoot exploit?
Let's just kill computing, if we found the absolute vulnerability...
They are literally just reading the hash from the / etc / passwd file after they have loaded in disk cache (i.e. RAM) by trying a sudo login.
Comment
-
-
Originally posted by onlyLinuxLuvUBack View PostThe next intel swiss-lake should probably just use the Intel 14nm++++++++++++++++++++++++++++++++++++++++++++(c )(tm) manufacturing process and just place isolated "thoroughly" scrubbed "secure" cpu pentium 3 cores and throw in a fpga cpu core in case things like this happen.
Comment
-
-
Originally posted by CochainComplex View Postso where are the non speculative CPU's? is it still possible or will this push us back to pre-P4 era (performancewise)?
Comment
-
Comment