Rich Freeman on 6 Jan 2018 11:11:52 -0800


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [PLUG] Intel SA-00086 critical BIOS update


On Sat, Jan 6, 2018 at 1:16 PM, Will <staticphantom@gmail.com> wrote:
> I believe that was Meltdown Aaron.
>

I wouldn't rule out the possibility of Spectre being triggered by
javascript, but it would be difficult.  In order to execute Spectre
the malicious code needs to be able to call a vulnerable target
function.  Sandboxes don't usually let function calls through.
Processes that can execute arbitrary code are more of an issue.

Meltdown does not require subverting a function that already has
access to privileged memory.  It bypasses the privilege checks in the
CPU to access virtual memory outside of its ring.  This would
definitely be easier to pull off on a vulnerable CPU (Intel only I
think).

So far the Spectre attacks on Intel cannot be completely prevented
only by the use of firmware updates, though some of the solutions
being discussed require a microcode update as part of the solution.

-- 
Rich
___________________________________________________________________________
Philadelphia Linux Users Group         --        http://www.phillylinux.org
Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce
General Discussion  --   http://lists.phillylinux.org/mailman/listinfo/plug