TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Xen Project Spectre/Meltdown FAQ

139 pointsby r4umover 7 years ago

4 comments

weinzierlover 7 years ago
&gt; Is there any risk of privilege escalation?<p>&gt; Meltdown and Spectre are, by themselves, only information leaks. There is no suggestion that speculative execution can be used to modify memory or cause a system to do anything it might not have done already.<p>Aren&#x27;t they a bit too casual here? The answer is not wrong in the sense that Meltdown and Spectre themselves can&#x27;t directly be used for privilege escalation.<p>On the other hand the question they posed was: &quot;Is there any risk of privilege escalation?&quot; and I wouldn&#x27;t be so quick about that. If I can read arbitrary kernel memory isn&#x27;t there a chance (at least under some circumstances) that I can find something (clear text or hashed root password maybe) that enables trivial privilege escalation?
评论 #16077268 未加载
lowbloodsugarover 7 years ago
&gt;There are two angles to consider for this question:<p>&gt;Can an untrusted guest attack the hypervisor using Meltdown or Spectre?<p>&gt;Can a guest user-space program attack a guest kernel using Meltdown or Spectre?<p>There are two angles if you maintain Xen yourself. However the vast majority of people aren&#x27;t Xen customers, they are customers of Amazon or other cloud provider. In which case the main concern is:<p><i>Can a fellow customer guest running on an AWS instance attack my guest account?</i><p>It seems like the answer is &quot;No&quot;, but it looks like the answer might be &quot;Only if dom0 is patched&quot;, and might even be &quot;Yes&quot;. Since it&#x27;s not in AWS interests to publicize that the answer is Yes, and since AWS is a large user of Xen, I find the it unsettling that this question is unanswered. It makes me thing it is unanswered for a reason. And if the response is &quot;Oh, we didn&#x27;t think about it from that perspective&quot;, then that would be even more disturbing.
fyi1183over 7 years ago
The linked advisory 254 claims that SP2 is limited to code after bounds checks and similar when SMEP is used.<p>This is incorrect: the BTB can be poisoned to speculatively jump anywhere in the text segment of the supervisor.
nukeopover 7 years ago
Intel PR monkeys are trying to take AMD down with them, let&#x27;s make this clear:<p>For the 3 bugs, the biggest one only affect Intel CPUs, for bug 2 and 3:<p>AMD bug only affects THE SAME PROCESS, unlike Intel, which allows exploits to cross processes:<p><a href="https:&#x2F;&#x2F;googleprojectzero.blogspot.com&#x2F;2018&#x2F;01&#x2F;reading-privileged-memory-with-side.html" rel="nofollow">https:&#x2F;&#x2F;googleprojectzero.blogspot.com&#x2F;2018&#x2F;01&#x2F;reading-privi...</a><p>&quot;As shown, AMD was only vulnerable to &quot;the ability to read data inside mis-speculated execution within the same process, without crossing any privilege boundaries.&quot;
评论 #16077526 未加载
评论 #16077569 未加载
评论 #16079064 未加载
评论 #16077746 未加载