PC Ekspert Forum

PC Ekspert Forum (https://forum.pcekspert.com/index.php)
-   Intel (https://forum.pcekspert.com/forumdisplay.php?f=8)
-   -   Rasprava i komentari o "Spectre" i "Meltdown" pošastima (https://forum.pcekspert.com/showthread.php?t=290321)

The Exiled 03.03.2018. 21:56

SgxSpectre Attack Can Extract Data from Intel SGX Enclaves
Citiraj:

Intel Software Guard eXtensions (SGX) is a feature of modern Intel processors that allow an application to create so-called enclaves. This enclave is a hardware-isolated section of the CPU's processing memory where applications can run operations that deal with extremely sensitive details, such as encryption keys, passwords, user data, and more. According to researchers, SgxSpectre works because of specific code patterns in software libraries that allow developers to add SGX support to their apps. Vulnerable SGX development kits include the Intel SGX SDK, Rust-SGX, and Graphene-SGX. Intel's recent Spectre patches don't necessarily help, as an attacker can work around these fixes. Intel says an update for the Intel SGX SDK that adds SgxSpectre mitigations will be released on March 16. App developers will need to integrate this new SDK version into their SGX-capable apps and issue an update to users. Apps that implement Google's Retpoline anti-Spectre coding techniques are safe, researchers say.

Gigi1 05.03.2018. 10:23

shitshow se i dalje nastavlja, ali bitno da se pisalo da je "bug nepostojeci"

Tajl3r 06.03.2018. 08:00

https://newsroom.intel.com/wp-conten...e-guidance.pdf

Manuel Calavera 06.03.2018. 08:44

Frend ima neke pizdarije sa win, povuklo mu update za spectre kaže, pa je sad ubacivao neke starije microcodove tj. modao je biose

The Exiled 15.03.2018. 15:26

Intel Publishes Spectre & Meltdown Hardware Plans: Fixed Gear Later This Year
Citiraj:

Intel is announcing that they have developed hardware fixes for both the Meltdown and Spectre v2 vulnerabilities, which in turn will be implemented into future processors. Both the next version of Intel’s Xeon server/HEDT platform – Cascade Lake – as well as new 8th gen Core processors set to ship in the second half of this year will include the mitigations. Meanwhile for updating Intel’s consumer chips, this is a bit more nebulous. While Intel hasn’t shared the complete text of their announcement with us ahead of press time, their specific wording is that the changes will be included in 8th gen Core processors “expected to ship in the second half of 2018.” Intel hasn’t said what processor family these are (e.g. Cannon Lake?), or for that matter whether these are even going to be traditional consumer chips or just the Core HEDT releases of Cascade Lake.

As for the hardware changes themselves, it’s important to note that Intel’s changes only mitigate Meltdown (what Intel calls “variant 3”) and Spectre variant 2. In both cases the company has mitigated the vulnerabilities through a new partitioning system that improves both process and privilege-level separation, going with a “protective walls” analogy. Unfortunately these hardware changes won’t mitigate Spectre variant 1. And admittedly, I haven’t been expecting Intel (or anyone else) to figure that one out in 2018. The best mitigations for Spectre v1 will remain developer-focused software techniques such as retpoline.
Izvor: AnandTech

geronimo_2 28.03.2018. 10:13

it continues...

http://news.softpedia.com/news/after...s-520433.shtml

The Exiled 28.03.2018. 11:29

Začarani krug, a zakrpe i dalje rade više štete nego koristi.

geronimo_2 04.04.2018. 13:50

http://www.zdnet.com/article/intel-w...n-these-chips/

"it is impractical..."
dirty SOBs

edit: microcode update guidance
https://newsroom.intel.com/wp-conten...e-guidance.pdf

kopija 04.04.2018. 14:06

Citiraj:

Autor geronimo_2 (Post 3180656)

Čisto sumnjam da bi proizvođači matičnih starih deset godina izbacili nove biose čak i kada bi Intel izdao microcode update.

popo1 04.04.2018. 14:58

Ako netko zna,
ako skinem sa microsoftove stranice zadnju verziju Windowsa 10, da li su u njima ove zakrpe protiv spectre i meltdown bug-a ?
I da li su sa tim zakrpama slabije performanje računala.
Inače, imam i5 kaby lake.
Zahvaljujem

The Exiled 11.04.2018. 12:05

AMD Releases Spectre v2 Microcode Updates for CPUs Going Back to 2011
Citiraj:

AMD has released CPU microcode updates for processors affected by the Spectre variant 2 (CVE-2017-5715) vulnerability. The company has forwarded these microcode updates to PC and motherboard makers to include them in BIOS updates. Updates are available for products released as far as 2011, for the first processors of the Bulldozer line. The KB4093112 update included in the April 2018 Patch Tuesday contains additional Spectre v2 mitigations, not included with the original January 2018 Patch Tuesday release, which AMD deems necessary to completely mitigate Spectre v2. The company is still preparing patches for the RyzenFall, MasterKey, Fallout, and Chimera vulnerabilities that came to light last month, considered less dangerous and easier to fix than the Meltdown and Spectre flaws.
Izvor: BleepingComputer

Citiraj:

Autor popo1 (Post 3180679)
ako skinem sa microsoftove stranice zadnju verziju Windowsa 10, da li su u njima ove zakrpe protiv spectre i meltdown bug-a ? I da li su sa tim zakrpama slabije performanje računala.

Zasad te zakrpe još uvijek nisu integrirane (možda jednog dana budu:)), ali Windows Update tijekom i nakon instalacije pokupi sve bitno.

Performanse mogu, a i ne moraju biti iste - nažalost ovisi kakve si sreće.

popo1 18.04.2018. 11:41

Ok, hvala na odgovoru.

The Exiled 03.05.2018. 20:34

Spectre Watch: More Spectre-class CPU Vulnerabilities to be Announced Soon?
Citiraj:

Heise.de has published an exclusive report stating that they got wind of a new series of Spectre-class vulnerabilities that are currently being investigated by the greater security community, and that these vulnerabilities are going to be announced in the coming days. Meanwhile, seemingly in response to the Heise article, Intel has just published their own statement on the matter, which they’re calling “Addressing Questions Regarding Additional Security Issues.” Sources point to 8 individual CVE-assigned Spectre-class attacks, which for the moment they’re calling Spectre-NG. According to the site, Intel is working on two waves of patches, with the first wave currently set to be released in May, and Heise is further speculating that information on the first wave will be released just ahead of May’s Patch Tuesday. Meanwhile information on a second flaw could be released “any day now.”
Izvor: AnandTech

The Exiled 22.05.2018. 08:38

Google and Microsoft Reveal New Spectre Attack
Citiraj:

Security researchers from Google and Microsoft have found two new variants of the Spectre attack that affects processors made by AMD, ARM, IBM, and Intel. Rumors about this new flaw leaked online at the start of the month in a German magazine, but actual details were published today. Impressively, AMD has already released a 5 page whitepaper on the vulnerability, as well as a post on their security updates page outlining that they will be providing updates back to the Bulldozer series of processors. Even more remarkable, is AMD stats that these updates are already in the hands of Microsoft, who is completing final testing and validation and will be released over the standard update process.

The bugs - referred to in the past weeks as SpectreNG - are related to the previous Meltdown and Spectre bugs discovered last year and announced at the start of 2018. Both Google and Microsoft researchers discovered the bug independently. The bugs work similarly to the Meltdown and Spectre bugs, a reason why they were classified as "variant 3a" and "variant 4" instead of separate vulnerabilities altogether.
  • Variant 1: bounds check bypass (CVE-2017-5753) aka Spectre v1
  • Variant 2: branch target injection (CVE-2017-5715) aka Spectre v2
  • Variant 3: rogue data cache load (CVE-2017-5754) aka Meltdown
  • Variant 3a: rogue system register read (CVE-2018-3640)
  • Variant 4: speculative store bypass (CVE-2018-3639)

Izvor: BleepingComputer

pci_e3x 14.08.2018. 21:13

'ajmo izbacit dovoljno patcheva za (namjerne?) sigurnosne rupe u nasim proizvodima. Tako da kada izbacimo nove generacije CPU-a, izgledat ce da su puno brzi od starih.


L1 Terminal Fault - The Latest Speculative Execution Side Channel Attack
"While Meltdown breaks the user space to kernel space protection, L1TF allows to attack any physical memory address in the system and the attack works across all protection domains. It allows an attack of SGX and also works from inside virtual machines because the speculation bypasses the extended page table (EPT) protection mechanism. "
https://www.phoronix.com/scan.php?pa...Terminal-Fault



A Lot Of Spectre Changes Land In The Linux 4.19 Git Tree, Possible Performance Impact
https://www.phoronix.com/scan.php?pa...86-PTI-Spectre


Prije nego netko hate-a Windows, vec su izbacili patch:
https://support.microsoft.com/en-ae/...date-kb4343909

I Logo + Web je online, bez toga nije prava sigurnosna prijetnja:
https://foreshadowattack.eu/

:beer:

The Exiled 27.08.2018. 23:00

Windows 10 KB4100347 Intel CPU Update Causing Boot Issues & Pushed to AMD Users
Citiraj:

On August 21st, Microsoft released an update to the May KB4100347 security update for Windows 10 and Windows Server 2016, which contain Intel CPU microcode updates to mitigate Spectre vulnerabilities. After installing this latest version, Windows users are reporting that they are unable to properly boot Windows 10 or are having performance issues. To further complicate the issue, this Intel CPU update is also being pushed to users of AMD processors. While it appears that AMD users are not suffering the same issues as those using Intel processors, it does appear that Microsoft made a mistake by pushing out the update to these users and those who are using unsupported Intel processors.
Izvor: BleepingComputer

Smartic 27.08.2018. 23:12

Meni od updatea prije 2 tjedna nadalje monitor bude u wake-up loopu po cca. 10 minuta kod svakog boota. Pojavi se slika na 0.2-3s pa crno 2-3s i tako konstantno dok se ne 'nađe'. Ne znam je li sigurno do toga, ali monitor radi normalno na jednom drugom kompu i na laptopu.

Mislite da bi updateanje BIOS-a riješilo to? Vidim da su u međuvremenu 3 zakrpe izašle za mikrokod(za moju ploču)...

The Exiled 27.08.2018. 23:22

Jesi možda probal da li je takva situacija i kad spojiš monitor na iGPU izlaz na ploči? GTX 1080 možeš privremeno maknuti za to vrijeme. Čisto da i to eliminiraš.

Kaj se BIOS-a tiče, možeš probati novu verziju, ali obzirom da s ovim zakrpama fušaju na sve strane, bogtepitaj da li bude imalo kakvog učinka.

pci_e3x 30.08.2018. 16:53

The Performance Cost Of Spectre / Meltdown / Foreshadow Mitigations On Linux 4.19

https://www.phoronix.com/scan.php?pa...igations&num=1

The Exiled 05.11.2018. 12:26

Intel CPUs fall to new hyperthreading exploit that pilfers crypto keys
Citiraj:

PortSmash, as the new attack is being called, exploits a largely overlooked side-channel in Intel’s hyperthreading technology. Utilizing this attack, researchers were able to steal the private decryption key from an OpenSSL thread running in the same core as their exploit. While the researchers have only tested this vulnerability against Intel Skylake and KabyLake processors, they also expect it to work on AMD Ryzen processors. The only way to mitigate this attack is to disable SMT/Hyper-threading on a computer, which OpenBSD has already done by default since this summer when another timing attack was released called TLBleed. Intel has already removed hyper-threading from their new 9th generation gaming CPUs in order to offer hardware protection from Meltdown v3 and the L1 Terminal Fault vulnerabilities.
Izvor: ArsTechnica i BleepingComputer

The Exiled 05.03.2019. 20:54

Spoiler Alert: New Security Vulnerability Found Affecting Intel CPUs:kafa:
Citiraj:

Dubbed Spoiler, the newfound security vulnerability was discovered by the Worcester Polytechnic Institute in partnership with the University of Lübeck, and affects all Intel CPUs since the introduction of their Core architecture. The researchers also examined ARM and AMD processor cores, but found they did not exhibit similar behavior. This vulnerability too affects Intel's speculative execution design, and according to the researchers, works independent of OS, virtual machine, or sandboxed environments. As the researchers explain, Intel's speculative execution of certain memory workloads requires the full physical address bits for the information in memory to be known, which could allow for the full address to be available in user space - allowing for privilege escalation and other microarchitectural attacks. According to the researchers, a software solution to this problem is impossible, which means this is yet another silicon-level bug that needs to be addressed in future processor designs.

The issue is separate from the Spectre vulnerabilities, and is not addressed by existing mitigations. It can be exploited from user space without elevated privileges. Spoiler describes a technique for discerning the relationship between virtual and physical memory by measuring the timing of speculative load and store operations, and looking for discrepancies that reveal memory layout. Modern processors manage reading and writing to RAM using a memory order buffer to keep track of operations. The buffer is used to perform store instructions – copying data from a CPU register to main memory – in the order they are laid out in executable code, and perform load operations – copying data from main memory to a register – out-of-order, speculatively. It allows the processor to run ahead and speculatively fetch information from RAM into the registers, provided there are no dependency problems, such as a load relying on an earlier store that hasn't yet completed.

Spoiler will make existing Rowhammer (1 - 2) and cache attacks easier, and make JavaScript-enabled attacks more feasible – instead of taking weeks, Rowhammer could take just seconds. Moghimi said the paper describes a JavaScript-based cache prime+probe technique that can be triggered with a click to leak private data and cryptographic keys not protected from cache timing attacks.
Izvor: The Register i TechPowerUp

The Exiled 29.03.2019. 19:53

Researchers Exploit Undocumented Intel VISA Debug Controller To Intercept System Data:fiju:
Citiraj:

First identified by Maxim Goryachy and Mark Ermolov, this latest vulnerability leverages the VISA logic signal analyzer that is incorporated into the Platform Controller Hub (PCH) found on Intel-based motherboards and in Intel processors. According to the researchers, it is capable of “monitoring the state of internal lines and buses in real time.” The VISA exploit was detailed to the public at a Black Hat Asia 2019 session entitled Intel VISA: Through the Rabbit Hole. According to the researchers, the amount of data flowing through VISA (and the Management Engine) not only provides a wealth of data to researchers, but could also be exploited by nefarious parties. Crucially, accessing VISA can be done without the need to perform hardware modifications on a system. The PCH can handle communications between the processor and external components like the display and peripherals (webcams, keyboards, mice, etc.). VISA can capture these signals, which means that any unauthorized access to a machine – perpetrated through malware, for example – could give an attacker access to a wealth of information if they can decipher the flow of information.
Izvor: HotHardware

The Exiled 14.05.2019. 21:36

New RIDL and Fallout Attacks Impact All Modern Intel CPUs
Citiraj:

Multiple security researchers have released details about a new class of speculative attacks against all modern Intel processors. The attacks are different from and more dangerous than Meltdown, Spectre and their variations because they can leak data from CPU buffers, which is not necessarily present in caches. Two attacks dubbed RIDL and Fallout exploit a set of four vulnerabilities collectively known as Microarchitectural Data Sampling (MDS) vulnerabilities - a name given by Intel. The flaws affect Intel CPUs released since 2008, the researchers say. Both RIDL and Fallout can be used in real-life scenarios where an adversary can point the victim to a webpage with malicious JavaScript to steal sensitive information on the system, like passwords and cryptographic keys.

RIDL exploits three bugs in Intel CPUs to leak data from different internal CPU buffers (e.g. Line-Fill Buffers and Load Ports). The processor uses these buffers for loading or storing data in memory. Fallout exploits a fourth vulnerability in Intel CPUs to leak data from Store Buffers, which is used when a CPU pipeline needs to store any type of data. This attack works against the Kernel Address Space Layout Randomization (KASLR) protection against memory corruption bugs. Fallout also impacts all modern Intel processors, including those of the 9th generation, which include in-silicon mitigations for Meltdown.
Izvor: BleepingComputer, Wired i MDS Attacks

kopija 15.05.2019. 08:53

Prošla je godina dana a nebo se još nije srušilo. Neki junaci čak preporučaju disejblanje patcheva.
https://www.techrepublic.com/article...ns-of-malware/
Citiraj:

Researchers have gathered more than 130 samples of malware that try to exploit Meltdown and Spectre, although most appear to be proof-of-concept code.
https://twitter.com/avtestorg/status/959332840675708929
Citiraj:

Most samples are binaries (compiled for Windows, Linux and MacOS), but we also found the first working JavaScript PoC for Spectre.
Citiraj:

Yes, similar to existing attacks, attackers can only mount our attacks in practical settings once they have the ability to execute (unprivileged) code on the victim machine. We could convince ourselves this is still an obstacle, but we should first be prepared to disable JavaScript (and similar) in the browser, abandon cloud computing, etc.
Browseri nemaju elevated privileges, pa kako onda maliciozni JS upogoniti?
Izgleda da moraš biti PhD da napraviš exploit tih vulnerabilitija.
Apokalipsa odgođena do daljnjega?

The Exiled 15.05.2019. 10:30

Možda:D:), ali lako za izbjegavanje zakrpa na osobnim računalima kad ova malo veća ekipa automatski krpa mašine na kojima se vrte Interneti.:kafa:

kopija 15.05.2019. 11:25

Nice, Retpoline za 1809 verziju. Srećom sam još na Sandy Bridge-u :)

Tajl3r 15.05.2019. 13:17

A je velika je to sreca kad ti okine 10% perfomansi u igrama,zato i je moj 2500K umirovljen.


Sent from my Redmi Note 5 using Tapatalk

Mladenxy 15.05.2019. 13:23

Ima kakav link da dosadašnje zakrpe ili ove nove "okine 10% performansi u igrama"?

Netko je to valjda testirao...

mamutarka 15.05.2019. 13:37

jebate tolko puta su već okinuli 10% da je u minusu :D

šalim se, ja nisam nešto primjetio u ovih godinu i pol, a bome trebao sam, ili je to random, da te zadesi

kopija 15.05.2019. 13:42

Citiraj:

Autor Mladenxy (Post 3301524)
Ima kakav link da dosadašnje zakrpe ili ove nove "okine 10% performansi u igrama"?

Netko je to valjda testirao...

https://access.redhat.com/articles/3307751


Sva vremena su GMT +2. Sada je 20:32.

Powered by vBulletin®
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
© 1999-2024 PC Ekspert - Sva prava pridržana ISSN 1334-2940
Ad Management by RedTyger