In others it will cause the kernel to hang whilst executing the instruction.Īt the time of publication there are no known exploits of this vulnerability. In some cases, it will cause the instructions to be executed in the kernel-space instead of the user-space, allowing an attacker to access sensitive kernel data. When these instructions are followed by a similar or unexpected instruction it can cause unexpected OS behaviour. This vulnerability is present in all systems that implement the Intel x86 architectures, including AMD. This vulnerability is caused by mishandling specific CPU instructions detailed in Intel’s Software Developer’s Manual. The poor implementation of a statement in Intel’s x86 programming manual can cause privilege escalation or denial-of-service on all operating system (OS) kernels developed using the guide.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |