• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.
  • The forums have been upgraded with support for dark mode. By default it will follow the setting on your system/browser. You may override it by scrolling to the end of the page and clicking the gears icon.

Yet Another Speculative Malfunction: Intel Reveals New Side-Channel Attack, Advises Disabling Hyper-Threading Below 8th, 9th Gen CPUs

Actually they've done a bunch of tests & they all look bad for Intel, albeit on Linux ~ https://www.phoronix.com/scan.php?page=article&item=mds-zombieload-mit&num=10

Let's see how some defending Intel respond to this :rolleyes:

I would say Intel kinda doesnt care about Linux, or at least it seems that way. Not that any HW manufacturer actually does much. Drivers always ages old or not really in great shape. :/

HT disabled will hurt on any platform. Unless you game, then its kinda non-issue. :D
 
So I guess my G620 needs to be also disabled on HT ?
 
New One:
Fallout: Reading Kernel Writes From User Space

Marina Minkin, Daniel Moghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel Gruss, Frank Piessens, Berk Sunar, Yuval Yarom

(Submitted on 29 May 2019)

Recently, out-of-order execution, an important performance optimization in modern high-end processors, has been revealed to pose a significant security threat, allowing information leaks across security domains. In particular, the Meltdown attack leaks information from the operating system kernel to user space, completely eroding the security of the system. To address this and similar attacks, without incurring the performance costs of software countermeasures, Intel includes hardware-based defenses in its recent Coffee Lake R processors.
In this work, we show that the recent hardware defenses are not sufficient. Specifically, we present Fallout, a new transient execution attack that leaks information from a previously unexplored microarchitectural component called the store buffer. We show how unprivileged user processes can exploit Fallout to reconstruct privileged information recently written by the kernel. We further show how Fallout can be used to bypass kernel address space randomization. Finally, we identify and explore microcode assists as a hitherto ignored cause of transient execution.
Fallout affects all processor generations we have tested. However, we notice a worrying regression, where the newer Coffee Lake R processors are more vulnerable to Fallout than older generations.
 
Here we go again.
 
New One:


Ironic that changes made in order to have more security VS some exploits actually makes it more vulnerable to this latest exploit.

Some clarification required:

Fallout affects all processor generations we have tested.

Does that include non-Intel CPUs?
 
Back
Top