At the very beginning we heard that AMD processors are not affected by all three attacks at all.
Soon after AMD admits that, well Spectre 1 attack is possible for perform, Spectre 2 attack is "near zero risk"
Now Spectre 2 attack is possible.
Since the publishing the initial research NO...
Well, the meltdown attck is easily noticeble. Because of CFLUSH-RELOAD scheme the L1/L2/L3 will be constantly resetted and you will experience the massive slowdowns on affected CPU core. As well other cores also will be slowed because of massive mem. controllers overload caused by this attack...
If Your browser run the malicious app, it will need no spectre/meltdown attack - it will already have a full access to your memory pool. Spectre and meltdown attacks are the ways to sneak to the other user's memory spaces from the guest account.
In fact no client sysytem should be patched. Only server where guest accounts with the ability to run the programs are permitted are affected by the attcks.
Not accurate.
In fact AMD archs also do not bother to check if the speculatively executed memory access request is valid. You can read it in meltdownattack site's document in p.6.4. Threre is a theoretical possibility to configure the attack that way that leakage can be performed also on AMD's...
Well, the matter of the Spectre/Meltdown is that running locally under the GUEST ACCOUNT malware can get through the flaws ( unauthorized access via speculative execution to the restricted areas of memory pools of other guest accounts or asdmin account) to the memory pools of other users. So, if...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.