Understanding the Meltdown exploit – in my own simple words
'As you might (hopefully) know, there was a serious CPU exploit exposed this week (called Meltdown), which will cause all Intel CPUs from the past 20 years to misbehave and return you critical, private data from other applications or even other VMs in a virtualized environment.
The terrible thing about Meltdown is that the exploit is possible because of the underlying CPU architecture, and can’t be fixed within the CPU itself. It is more or less “By Design”. Therefore the CPU exploit must be fixed in the software layer itself, which could also slow down the throughput for specific workloads. Fortunately Microsoft, Linux, Apple and VMware have already provided necessary patches to their Operating Systems to make sure that the Meltdown exploit can’t be used.
In this blog posting I want to give you an overview about how the Meltdown exploit works internally. There is already a really great whitepaper available, which describes the inner workings of Meltdown on a deep technical level. I want to show you in this blog posting in my own simple words how Meltdown works, and how private data can be retrieved with it.'...
Trackbacks
Die Kommentarfunktion wurde vom Besitzer dieses Blogs in diesem Eintrag deaktiviert.
Kommentare
Ansicht der Kommentare: Linear | Verschachtelt