PC Ekspert Forum

PC Ekspert Forum (http://forum.pcekspert.com/index.php)
-   Intel (http://forum.pcekspert.com/forumdisplay.php?f=8)
-   -   Rasprava i komentari o "Spectre" i "Meltdown" pošastima (http://forum.pcekspert.com/showthread.php?t=290321)

The Exiled 11.08.2022. 19:26

Taman pred izlazak i dolazak novih AMD Ryzen 7000 i Intel Raptor Lake modela, friški PoCjetnik da neprijatelj nikad ne spava.:):D
Citiraj:

APIC leak is an architectural CPU bug affecting 10th, 11th, and 12th Gen Intel Core Processors:kafa:
Citiraj:

The x86 CPU family has been vulnerable to many attacks in recent years. With the arrival of Spectre and Meltdown, we have seen side-channel attacks overtake both AMD and Intel designs. However, today we find out that researchers are capable of exploiting Intel's latest 10th, 11th, and 12th generation Core processors with a new CPU bug called ĆPIC Leak. Named after Advanced Programmable Interrupt Controller (APIC) that handles interrupt requests to regulate multiprocessing, the leak is claimeing to be the first "CPU bug able to architecturally disclose sensitive data." Researchers Pietro Borrello (Sapienza University of Rome), Andreas Kogler (Graz Institute of Technology), Martin Schwarzl (Graz), Moritz Lipp (Amazon Web Services), Daniel Gruss (Graz University of Technology), and Michael Schwarz (CISPA Helmholtz Center for Information Security) discovered this flaw in Intel processors. n contrast to transient execution attacks like Meltdown and Spectre, ĆPIC Leak is an architectural bug: the sensitive data gets directly disclosed without relying on any (noisy) side channel. ĆPIC Leak is like an uninitialized memory read in the CPU itself.
Izvor: TechPowerUp
Citiraj:

AMD's Zen architecture is vulnerable to a new insideous SMT security flaw:kafa:
Citiraj:

Researchers have detailed the SQUIP attack, which is particularly worrisome for users of AMD Zen 1, Zen 2 and Zen 3 processors. Researchers were able measure the precise degree of Scheduler Queue Usage (i.e., occupancy) via Interference Probing, giving the attack its name. Using this technique, it was possible in tests to recover a full RSA-4096 encryption key from a user on a co-located virtual machine (VM) and co-located process. SQUIP is claimed by researchers from the Graz University of Technology, the Georgia Institute of Technology, and the Lamarr Security Research Center to be the first side-channel attack on scheduler queues. Regular readers will be aware of the raft of side-channel memory reading vulnerabilities a few years back, with the most famous being Spectre and Meltdown. Here the data isn’t spied upon in memory, but within the processor scheduler queue.

For this reason, AMD Zen 1, Zen 2 and Zen 3 processors are the most vulnerable – with per execution unit scheduler queues and SMT (simultaneous multi-threading) providing the co-located VM/process snooping opportunities. Based on the above information, this vulnerability is not likely to be a huge problem for home PC users, enthusiasts and gamers. The attack as it is currently known to work relies on a few special conditions – namely that the attacker and victim must have co-located VMs or processes using the same physical core but run their code on different SMT threads. Thus, the victim’s process can be spied upon by an attacker using the other core thread in a VM. The researchers were able to extract data at a rate of 0.89 Mbit/s from a co-located VM and a rate of 2.70 Mbit/s from a co-located process with very high degrees of accuracy.
Izvor: HotHardware

The Exiled 25.07.2023. 11:19

Citiraj:

AMD 'Zenbleed' bug leaks data from Zen 2 Ryzen and EPYC CPUs:kafa:
Citiraj:

Tavis Ormandy, a researcher with Google Information Security, posted today about a new vulnerability he independently found in AMD's Zen 2 processors. The 'Zenbleed' vulnerability spans the entire Zen 2 product stack. The attack can be accomplished via unprivileged arbitrary code execution. Ormandy has posted a security research repository and code for the exploit. The attack works by manipulating the register files to force a mispredicted command (meaning it eploits the speculative execution engine). Zenbleed's practical impact on regular users is relatively low, as it requires local access to the target system and a high degree of specialization and knowledge to exploit. We reported this vulnerability to AMD on the 15th May 2023. AMD have released an microcode update for affected processors. Your BIOS or Operating System vendor may already have an update available that includes it.
Izvor: Google Information Security

The Exiled 08.08.2023. 20:28

Citiraj:

AMD recommends customers apply a µcode patch or BIOS update as applicable for products based on “Zen 3” and “Zen 4” CPU architectures. No µcode patch or BIOS update is necessary for products based on “Zen” or “Zen 2” CPU architectures because these architectures are already designed to flush branch type predictions from the branch predictor. It sounds like they have been working on this for some time as the Windows patch went live last month.
Citiraj:

The new Downfall vulnerability is a big one. This impacts Intel’s desktop CPUs up to Alder Lake and Intel’s server CPUs up to Ice Lake, the generation that was still top-of-the-line on the first day of 2023. Found by Daniel Moghimi, now at Google, the vulnerability targets AVX2 and AVX-512 pipelines in what Intel is calling a Gather Data Sampling (GDS) attack. Intel and Daniel have been working for some time on this before its disclosure today. Intel and its firmware and OS partners have been coordinating a microcode update that will mitigate the vulnerability.
:kafa:


Sva vremena su GMT +2. Sada je 19:14.

Powered by vBulletin®
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
© 1999-2023 PC Ekspert - Sva prava pridržana ISSN 1334-2940
Ad Management by RedTyger