- cross-posted to:
- cybersecurity@infosec.pub
- cross-posted to:
- cybersecurity@infosec.pub
- The new class of vulnerabilities in Intel processors arises from speculative technologies that anticipate individual computing steps.
- Openings enable gradual reading of entire privilege memory contents of shared processor (CPU).
- All Intel processors from the last 6 years are affected, from PCs to servers in data centres.
Thankfully my Thinkpads from the last decade are not affected.
This sounds just like Spectre/heartbleed. Haven’t we learned our lesson with speculative computation? I guess not…
Well you know what they say, if it was a bad idea 10 fucking years ago, then let’s do it again!
i mean just look at the performance hits with speculative execution off
With massive OOO pipelines, what’s the alternative?
Intel has not learned, still making money on crap chips.
Intel has already deployed a fix for this in the 13th and 14th gen by permanently damaging the chip and crashing. Checkmate hackers.
Another day, another speculative execution vulnerability.
No catchy name for the vulnerability? It can’t be that bad, then…
Let’s call it Son of Spectre
Bond, James Bond. Junior.
This vulnerability fundamentally undermines data security, particularly in the cloud environment where many users share the same hardware resources.
Intel gets punched again.
Who, my good friend, fucking WHO still buys Intel for the servers? It sucks so hard, I don’t get it.
Well personally, I’ve been having a bear of a time trying to get my Ryzen machine to run correctly. I’m starting to think there just aren’t good options
I’ve had numerous Ryzens, with 0 issues.
Fewer Epics, but no issues either.
What issues are you having?
Frequent crashing/freezing, especially at idle. Once the processor is under heavier load it’s fine, it’ll keep going smooth for hours. but at lower energy states the CPU is super unstable. It often takes me about a half hour just to get the thing up and running steady, very frustrating. Sometimes it likes to crash right as it’s changing load levels/c-State, so just as it finishes loading files for a game just as the first 3d frame is rendered. Or vice versa, it’ll crash about 15 seconds after the computer returns to mostly idle when you exit an application.
I’ve tried a bunch of things, disabling c-states, manually setting dram timings, manually increasing power to various parts, enabling/disabling just about every relevant feature I can find. And of course looking for help online. I’m actually pretty sure the problem is in the motherboard, as one of the “fixes” I tried was going from a Ryzen 3600 to a 3800X, and the problem was the same.
I’ve looked around and it’s an issue I have seen other people having, though it’s not very common. But there’s no consensus in the root of the problem. It does seem to be that it’s some interaction between the motherboard and cpu. It could plausibly be the power supply, but I think that’s pretty unlikely. The ram is fine.
I feel pretty duh here. That’s a great point.
Anyone having a link to a more technical (detailed) description?
This is quite novice orientated and I’d be very interested on how it actually works. Is there anything already disclosed?Edit: link at the end to the original research/more detailed explanation:
https://comsec.ethz.ch/research/microarch/branch-privilege-injection/Finally! I’ve been waiting to expose my processor
Exhibitionist, eh?
Intel Exhibitionist
Intel Outside