Intel Procs Again hit By Massive Vulnerability (called Spoiler)
Yeah, not exactly the most fun pun, but this is a spoiler alert. The vulnerability was given the name Spoiler and was discovered by the Worcester Polytechnic Institute and the University of Lübeck. it involves a leak in page mapping of working memory, making other attacks much easier to perform.
To perform tasks faster, speculative execution is applied to processes in working memory. In this case, data from the working memory is already cached in advance with so-called load and store instructions. However, if a physical memory address does not exist, data leaks away over the timing - the time it took to reach a physical memory address. The researchers mention , Rowhammer, cache and javascript attacks can be executed in merely seconds.
-- The Register --
This security shortcoming can be potentially exploited by malicious JavaScript within a web browser tab, or malware running on a system, or rogue logged-in users, to extract passwords, keys, and other data from memory. An attacker therefore requires some kind of foothold in your machine in order to pull this off. The vulnerability, it appears, cannot be easily fixed or mitigated without significant redesign work at the silicon level.
Speculative execution, the practice of allowing processors to perform future work that may or may not be needed while they await the completion of other computations, is what enabled the Spectre vulnerabilities revealed early last year.
In a research paper distributed this month through pre-print service ArXiv, "SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks," computer scientists at Worcester Polytechnic Institute in the US, and the University of Lübeck in Germany, describe a new way to abuse the performance boost.
Intel has was notified of the problem on December 1st. According to the researchers, a solution via a software update is virtually impossible and can only be remedied with an adjustment in architecture. If this is done, it will undoubtedly lead to lower performance. Whether there is a solution is very doubtful.
Arm and AMD processors are not vulnerable to this attack.
Intel Processor Refresh in Spring - 100 MHz bumps - 02/21/2019 09:10 AM
Earlier this week you've already read the funny news about a KFC edition, in the upcoming weeks more processors will be added into the lineup from Intel, they, however, all are refreshes mostly 100 M...
Shuttle launches DH370 Mini-PC for 6-core 8th Gen Intel Processors - 02/06/2019 08:49 AM
The 1.3-litre DH370 sports a new chassis design which accommodates Intel processors of the 8th generation for socket LGA1151v2, relies on the faster H370 chipset and offers a total of four USB 3.1 po...
Intel processor shortages to continue into 2Q19 says ASUS - 11/15/2018 09:01 AM
We've touched the topic a couple of times but it's now confirmed by ASUS as well. With the issues on 10nm fabrication, Intel is running out of fabrication space on 14nm, and they have a lot of proc...
Three new vulnerabilities in Intel processors discovered - L1TF - 08/15/2018 07:54 AM
Intel has announced that three new serious vulnerabilities have been discovered in its processors, allowing unauthorized access to data in the L1 cache. The vulnerabilities are named L1 Terminal Faul...
Intel Promotes Its Three Corporate Officers - 07/25/2018 04:05 AM
Intel today announced that its board of directors has promoted three corporate officers. "These promotions recognize the expanded scope and significance of the organizations for each of these pr...
Senior Member
Posts: 842
Joined: 2013-02-22
And with this any ipc advantage intel still had will be gone lol. looks like everything will be on who can get moar cores and or moar clock speed
Senior Member
Posts: 2004
Joined: 2012-04-16
Why do I get the feeling that Intel has been compromised by the intelligence agencies?
Senior Member
Posts: 1379
Joined: 2013-03-10
Intel is well past caring already. Back when Spectre was revealed, Intel was somewhat worried, or at least acted as if it was. But in the end, today, Intel can't produce enough merchandise to meet the demand, no matter how high they set the prices. I bet this particular vulnerability earned wide yawns from Intel execs, nothing more.
Senior Member
Posts: 161
Joined: 2013-02-07
Is a "Culnerability" a play on words I am ignorant to? Or just a typo in the title?
Senior Member
Posts: 240
Joined: 2014-12-09
@Hilbert Hagedoorn The title of the article says "
Senior Member
Posts: 5674
Joined: 2010-08-28
There is no saving Intel... especially seeing AMD isn't affected by any of this.
And if those recent Ryzen 3 prices are true...
Senior Member
Posts: 6532
Joined: 2010-11-16
Speculative execution is cunning, but is also a vulnerability.
Senior Member
Posts: 1451
Joined: 2017-03-10
Is it just a coincidence that their name is "Intel"? Can't say you weren't warned.
Nah, they just threw every other CPU manufacturer under the bus. "If I'm going down, I'm taking you all with me!"
Member
Posts: 44
Joined: 2018-05-04
Do some reading on "retpoline"....At least that will help claw back some performance for Win10 1809 users...
Senior Member
Posts: 10441
Joined: 2008-08-28
Time to abandon this intel sinking ship. Zen2 cant come soon enough.
Senior Member
Posts: 3371
Joined: 2008-03-06
IF, If only AMD will be devilishly clever to add the feature of disabling PSP or offering a line of CPUs free of this, they will be sell in a heartbeat the whole production volume to FSF and privacy concerned user's.
They would win twofold- no backdoor conspiracy behind PSP and a more secure, libre platform.
Little by little people are aware of hardware design flaws and built-in backdoors.
Yes, to some and including me the ATM and Intel ME add some sysadm perks for managing remote computers, but for my personal computers I want a free platform, without those.
Senior Member
Posts: 233
Joined: 2013-01-06
Only true for older cpu's 7th-9th gen see usually no drops in performance.
Senior Member
Posts: 313
Joined: 2018-05-03
Intel be like:
"We fixed speculative vulnerabilities"
Senior Member
Posts: 233
Joined: 2013-01-06
I truly doubt that is even the case. More like useless wining as usual.
Senior Member
Posts: 9788
Joined: 2014-07-21
spec-exec is just the plague of anything security related.
Do not wait for a fix for this in any form, Intel still hasn't been able to fix four year old CPUs, and they seem to do nothing to get such issues with spec-exec out of their system.
Just one more reason I'm waiting for Zen 3000 CPUs...