- The new class of vulnerabilities in Intel processors arises from speculative technologies that anticipate individual computing steps.
- Openings enable gradual reading of entire privilege memory contents of shared processor (CPU).
- All Intel processors from the last 6 years are affected, from PCs to servers in data centres.
No catchy name for the vulnerability? It can’t be that bad, then…
Let’s call it Son of Spectre
Bond, James Bond. Junior.
Wasnt CVE recently shut down, maybe that’s why it has no catchy name
CVEs follow a naming convention, the exploit name is usually given by the researcher/hacker/whoever finds and documents it
Intel has already deployed a fix for this in the 13th and 14th gen by permanently damaging the chip and crashing. Checkmate hackers.
Another day, another speculative execution vulnerability.
This vulnerability fundamentally undermines data security, particularly in the cloud environment where many users share the same hardware resources.
Intel gets punched again.
I feel pretty duh here. That’s a great point.
Finally! I’ve been waiting to expose my processor
Exhibitionist, eh?
Intel Exhibitionist
Intel Outside
Anyone having a link to a more technical (detailed) description?
This is quite novice orientated and I’d be very interested on how it actually works. Is there anything already disclosed?Edit: link at the end to the original research/more detailed explanation:
https://comsec.ethz.ch/research/microarch/branch-privilege-injection/This sounds just like Spectre/heartbleed. Haven’t we learned our lesson with speculative computation? I guess not…
Well you know what they say, if it was a bad idea 10 fucking years ago, then let’s do it again!
Intel has not learned, still making money on crap chips.
i mean just look at the performance hits with speculative execution off
With massive OOO pipelines, what’s the alternative?
Can it be triggered from a browser?
Because if not, it’s another non-issue issue for most people.
I think after the last round of exploits, most of the browser makers made timers deliberately inaccurate enough to prevent it being used.
average Intel moment
Thankfully my Thinkpads from the last decade are not affected.
He look the US is putting hardware level vulnerabilities in our chips just like China does.
We’re growing up so fast :'(
The so-called BPRC (Branch Predictor Race Conditions) emerge during a brief period of a few nanoseconds when the processor switches between prediction calculations for two users with different permissions, explains Sandro Rüegge, who has been examining the vulnerability in detail over the past few months.