- Joined
- Aug 12, 2016
- Messages
- 2,816 (2.32/day)
- Location
- Portugal
System Name | The Ryzening |
---|---|
Processor | Ryzen 7 1700 @ 3.7 GHz |
Motherboard | MSI X370 Gaming Pro Carbon |
Cooling | Arctic Cooling Liquid Freezer 120 |
Memory | 16 GB G.Skill Trident Z F4-3200 (2x 8 GB) |
Video Card(s) | TPU's Awesome MSI GTX 1070 Gaming X |
Storage | Boot: Crucial MX100 128GB; Gaming: Crucial MX 300 525GB; Storage: Samsung 1TB HDD, Toshiba 2TB HDD |
Display(s) | LG 29UM68P (21:9 2560x1080 FreeSync Ultrawide) |
Case | NOX Hummer MC Black |
Audio Device(s) | ASUS Xonar DX |
Power Supply | Seasonic M12II Evo 620W 80+ |
Mouse | Cooler Master Masterkeys Lite L |
Keyboard | Cooler Master Masterkeys Lite L |
Software | Windows 10 x64 |
A new security vulnerability has been found that only affects Intel CPUs - AMD users need not concern regarding this issue. Dubbed Spoiler, the newfound security vulnerability was discovered by the Worcester Polytechnic Institute in partnership with the University of Lübeck, and affects all Intel CPUs since the introduction of their Core architecture. This vulnerability too affects Intel's speculative execution design, and according to the researchers, works independent of OS, virtual machine, or sandboxed environments.
As the researchers explain, Intel's speculative execution of certain memory workloads requires the full physical address bits for the information in memory to be known, which could allow for the full address to be available in user space - allowing for privilege escalation and other microarchitectural attacks. According to the researchers, a software solution to this problem is impossible, which means this is yet another silicon-level bug that needs to be addressed in future processor designs.

View at TechPowerUp Main Site
As the researchers explain, Intel's speculative execution of certain memory workloads requires the full physical address bits for the information in memory to be known, which could allow for the full address to be available in user space - allowing for privilege escalation and other microarchitectural attacks. According to the researchers, a software solution to this problem is impossible, which means this is yet another silicon-level bug that needs to be addressed in future processor designs.


View at TechPowerUp Main Site