afaict it's less bug and "everyone didn't know it does that" + mov SS being exceedingly rare
-
-
-
Is this "bug" branded yet?
-
stop that
-
Fun fact: According to Intel, Meltdown is not a bug. https://www.intel.com/content/www/us/en/architecture-and-technology/facts-about-side-channel-analysis-and-intel-products.html …pic.twitter.com/bCusLDQTmm
-
tbh i agree
-
It's definitely a bug.
-
what aspect of it? not checking permissions on memory you're speculatively accessing, sure. generally, timing side-channels because you can massage the pipeline, though?
-
Meltdown is "not checking permissions". It's a clear bug. Spectre is a flaw in the whole concept of speculative execution. My take on that is that, without advanced mitigation, implementing a cpu using speculation is a bug.
End of conversation
New conversation -
-
-
Seems more like every OS just subtly overlooked how POP/MOV SS work. (Unnamed) CPU errata aren’t helping the fix though. FreeBSD patched today: https://www.freebsd.org/security/advisories/FreeBSD-SA-18:06.debugreg.asc … https://svnweb.freebsd.org/base?view=revision&revision=333368 …
-
"No workaround is available." seems wrong. Just disabling ptrace should suffice.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.