It should be obvious intel CPUs are not working as designed or intended. They were intended and designed to not allow lower level processes to access privileged data. They missed something and that means the CPUs have a bug.
Um, they don't allow lower privileged processes to access higher privileged data. If they did, a side channel attack wouldn't be required. This definitely falls into the exploit category and not the bug category.
Spectre as an exploit targets a particular architectural decision (OoO, speculative processing). Which isn't a bug, is a general security issue that needs to be resolved.
Meltdown is an exploit that targets a specific bug or design deficit on Intel processors. Intel CPU's are not doing what they are supposed to be doing and Meltdown takes advantage of that.
Both Meltdown and Spectre are exploits that target speculative execution. Meltdown is not the result of a specific bug OR design deficit. Intel CPUs are doing what they are suppose to due. They are susceptible to a side channel exploit like a wide range of designs from multiple vendors using multiple ISAs.
Yeah. No. The CPUs are not working as intended. The CPUs are intended to prevent code accessing privileged data.
Which they do. Anyone saying they don't is simply lying. Side channel attacks exist specifically because the CPU is preventing code from accessing privileged data, if the CPU wasn't doing the right thing, a side channel attack wouldn't be required.
In regards to Meltdown. It would not exist if Intel CPU's unlike did what it was supposed to when verifying memory access permissions after the code has been processed. It should do a check notice the discrepancy and chuck it. That is what the check is for. That is what all other CPU's do. Whether it was an intentional choice by an engineer when realizing it was doing what it was supposed to do, a design decision by Intel to ignore the security check for performance, or it was just an oversight because when this was originally done, there wasn't really an attack vector that could utilize it anyways, there is a design feature included in the CPU that doesn't handle it's job correctly. That is a bug and not a CPU doing what it is supposed but a new exploit takes advantage of that.
They do do a check and notice the discrepancy and chunk it. They work like almost all other speculative OOO CPUs. There is literally only 1 CPU that does speculative OOO execution and doesn't do it like Intel and that is zen and that wasn't to prevent some bug, that was a power optimization. Power? Same thing as Intel. All other AMD OOO designs? Same thing as Intel. Alpha? Same thing as Intel. MIPS? Same thing as Intel. ARM? Same thing as Intel. Literally every OOO design except Zen has the meltdown issue.
Intel doesn't have any security checks for cache data read tasks.
Intel has security checks in place but the CPU ignores those checks for whatever reason.
These are categorically false statements.