kevinkin Posted January 5, 2018 Share Posted January 5, 2018 https://www.pcworld.com/article/3245606/security/intel-x86-cpu-kernel-bug-faq-how-it-affects-pc-mac.html 0 Quote Link to comment Share on other sites More sharing options...
A Canadian Cat Posted January 5, 2018 Share Posted January 5, 2018 Oh yeah loads of fun there. This article has a nice little tid bit: https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/ "The fix is to separate the kernel's memory completely from user processes using what's called Kernel Page Table Isolation, or KPTI. At one point, Forcefully Unmap Complete Kernel With Interrupt Trampolines, aka ****WIT, was mulled by the Linux kernel team, giving you an idea of how annoying this has been for the developers." LOL 0 Quote Link to comment Share on other sites More sharing options...
General Jack Ripper Posted January 5, 2018 Share Posted January 5, 2018 (edited) I knew there was a reason I switched to AMD. Edited January 5, 2018 by SLIM 0 Quote Link to comment Share on other sites More sharing options...
Vanir Ausf B Posted January 5, 2018 Share Posted January 5, 2018 Got the Window 10 update last night that I presume contains the "fix" for this. Then I got my first ever BSOD on this machine a few hours later. 0 Quote Link to comment Share on other sites More sharing options...
kevinkin Posted January 5, 2018 Author Share Posted January 5, 2018 Pre and post patched Win 10 CM benchmarks need to be completed. The gaming industry is posting results for their products. Albeit players mostly. Maybe this will go away for our narrow purposes and we will see no performance hits. This is a rather big event never-the-less. Heads up. Kevin 0 Quote Link to comment Share on other sites More sharing options...
sburke Posted January 6, 2018 Share Posted January 6, 2018 5 hours ago, Vanir Ausf B said: Got the Window 10 update last night that I presume contains the "fix" for this. Then I got my first ever BSOD on this machine a few hours later. hmm interesting as I am noticing some less than stellar behavior in certain instances as well. So far none affecting CM though. 0 Quote Link to comment Share on other sites More sharing options...
A Canadian Cat Posted January 6, 2018 Share Posted January 6, 2018 Yikes I'll hold off a bit then - let you guys work out the kinks :-) 0 Quote Link to comment Share on other sites More sharing options...
kevinkin Posted January 7, 2018 Author Share Posted January 7, 2018 (edited) Surprised the malicious code can be written in JS and it's short. Two articles for those interested in going under the hood: https://www.react-etc.net/entry/exploiting-speculative-execution-meltdown-spectre-via-javascript https://react-etc.net/page/meltdown-spectre-javascript-exploit-example I am a hobbyist programmer. I thought that since JS can only run in a browser environment, the browser would provide security against this type of malicious code i.e. writing or reading directly from memory. I can see it with assembly or C. What makes JS so dangerous is the code can be pushed to the local computer by an unwitting web surfer. Kevin Edited January 7, 2018 by kevinkin 0 Quote Link to comment Share on other sites More sharing options...
Sgt.Squarehead Posted January 8, 2018 Share Posted January 8, 2018 On 05/01/2018 at 8:16 PM, Vanir Ausf B said: Got the Window 10 update last night that I presume contains the "fix" for this. Then I got my first ever BSOD on this machine a few hours later. You clearly crashed the NSA's warez.....Watch your back dude! 0 Quote Link to comment Share on other sites More sharing options...
kevinkin Posted January 8, 2018 Author Share Posted January 8, 2018 Funny you mention the NSA. There was some speculation originally that the Meltdown and Spectre vulnerabilities were identified by the Agency and entered the public domain via the leaks last Spring. Kevin 0 Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.