Driver Problems? Questions? Issues?
Put OSR's experience to work for you! Contact us for assistance with:
  • Creating the right design for your requirements
  • Reviewing your existing driver code
  • Analyzing driver reliability/performance issues
  • Custom training mixed with consulting and focused directly on your specific areas of interest/concern.
Check us out. OSR, the Windows driver experts.

OSR Seminars


Go Back   OSR Online Lists > ntdev
Welcome, Guest
You must login to post to this list
  Message 1 of 3  
03 Jan 18 11:49
Jan Bottorff
xxxxxx@pmatrix.com
Join Date: 16 Apr 2013
Posts To This List: 434
Nasty new Intel processor bug

I'm reading on sources like https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/ a new bug has been discovered in many Intel processors. The exact details are not public yet, but the fix is claimed to require putting user mode and kernel mode address spaces in separate processes (very bad for performance). Some mystery uncommented Linux kernel patches are public, and the article says the problem impacts all OSs. Assuming this is real, it sounds like it may have a large impact on folks working in kernel land. Jan --
  Message 2 of 3  
03 Jan 18 12:10
Iolanda Milani
xxxxxx@gmail.com
Join Date: 31 Dec 2017
Posts To This List: 17
Nasty new Intel processor bug

The vulnerability is likely very nasty because the patch will cause a huge performance reduction, and this is going to cost a lot of money for companies. I don't think Intel will get off lightly for whatever this is about however the CEO sold over 200,000 shares in December, and he's sticking to the minimum he is legally enforced to keep as the CEO. Likely a dangerous privilege escalation exploit. Some rumours claim it can allow an attacker to escape virtualisation, which wouldn't be illogical considering such technology like Intel VT-x is enforced from the processor. And the issue doesn't affect AMD apparently, and they have their own AMD SVM for virtualisation technology.
  Message 3 of 3  
03 Jan 18 12:27
Don Burn
xxxxxx@windrvr.com
Join Date: 23 Feb 2011
Posts To This List: 1406
Nasty new Intel processor bug

Intel is famous for these (though most are kept quiet by contract). Back when the 486 came out if there was a bug if you were running in 32-bit and took one of a number of exceptions, the processor would freeze, overheat and literally fly apart. Most vendors refused to ship that version, though a firm in England called Apricot Computer did, the company went under when the bug burned down a major medical records company. Of course Intel got off without any impact. Don Burn Windows Driver Consulting Website: http://www.windrvr.com From: xxxxx@lists.osr.com [mailto:xxxxx@lists.osr.com] On Behalf Of xxxxx@pmatrix.com Sent: Wednesday, January 03, 2018 11:49 AM To: Windows System Software Devs Interest List <xxxxx@lists.osr.com> Subject: [ntdev] Nasty new Intel processor bug I'm reading on sources like https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/ a new bug has been discovered in many Intel processors. The exact details are not public yet, but the fix is claimed to require putting user mode and kernel mode address spaces in separate processes (very bad for performance). Some mystery uncommented Linux kernel patches are public, and the article says the problem impacts all OSs. Assuming this is real, it sounds like it may have a large impact on folks working in kernel land. Jan --- NTDEV is sponsored by OSR Visit the list online at: <http://www.osronline.com/showlists.cfm?list=ntdev> MONTHLY seminars on crash dump analysis, WDF, Windows internals and software drivers! Details at <http://www.osr.com/seminars> To unsubscribe, visit the List Server section of OSR Online at <http://www.osronline.com/page.cfm?name=ListServer> --
Posting Rules  
You may not post new threads
You may not post replies
You may not post attachments
You must login to OSR Online AND be a member of the ntdev list to be able to post.

All times are GMT -5. The time now is 23:31.


Copyright ©2015, OSR Open Systems Resources, Inc.
Based on vBulletin Copyright ©2000 - 2005, Jelsoft Enterprises Ltd.
Modified under license