Here's a few quotes from the article:
"There is a problem where some anti-virus vendors are using techniques to bypass Kernel Patch Protection by injecting a hypervisor which they use to intercept syscalls and make assumptions about memory locations — memory locations which are now changing with the Meltdown fixes."
"Please stop using goofy, undocumented and hacky ways to predict memory locations and mess with syscalls. There’s 5 key vendors doing this (and lots of OEM vendors licensing engines): please tidy up the code.
Source: Important information about Microsoft Meltdown CPU security fixes, antivirus vendors and you
What is your opinion on this?
"There is a problem where some anti-virus vendors are using techniques to bypass Kernel Patch Protection by injecting a hypervisor which they use to intercept syscalls and make assumptions about memory locations — memory locations which are now changing with the Meltdown fixes."
"Please stop using goofy, undocumented and hacky ways to predict memory locations and mess with syscalls. There’s 5 key vendors doing this (and lots of OEM vendors licensing engines): please tidy up the code.
Source: Important information about Microsoft Meltdown CPU security fixes, antivirus vendors and you
What is your opinion on this?