Please disable your adblock and script blockers to view this page

SPOILER alert, literally: Intel CPUs afflicted with simple data-spewing spec-exec vulnerability


Intel
JavaScript
Spectre
ArXiv
Worcester Polytechnic Institute
the University of Lübeck
Rowhammer
Arm
AMD
Intel Core
OS
Register
SPOILER
Mitigations
CVE
PublishingJoin


Saad Islam
Ahmad Moghimi
Ida Bruhns
Moritz Krebbel
Berk Gulmezoglu
Thomas Eisenbarth
Berk Sunar
Spectre
Daniel
Rowhammer

No matching tags

No matching tags

No matching tags


US
Germany
CPUs."SPOILER
JavaScript

No matching tags

Positivity     34.00%   
   Negativity   66.00%
The New York Times
SOURCE: https://www.theregister.co.uk/2019/03/05/spoiler_intel_flaw/
Write a review: Hacker News
Summary

The vulnerability, it appears, cannot be easily fixed or mitigated without significant redesign work at the silicon level.Speculative execution, the practice of allowing processors to perform future work that may or may not be needed while they await the completion of other computations, is what enabled the Spectre vulnerabilities revealed early last year.In a research paper distributed this month through pre-print service ArXiv, "SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks," computer scientists at Worcester Polytechnic Institute in the US, and the University of Lübeck in Germany, describe a new way to abuse the performance boost.The researchers – Saad Islam, Ahmad Moghimi, Ida Bruhns, Moritz Krebbel, Berk Gulmezoglu, Thomas Eisenbarth and Berk Sunar – have found that "a weakness in the address speculation of Intel’s proprietary implementation of the memory subsystem" reveals memory layout data, making other attacks like Rowhammer much easier to carry out.The researchers also examined Arm and AMD processor cores, but found they did not exhibit similar behavior."We have discovered a novel microarchitectural leakage which reveals critical information about physical page mappings to user space processes," the researchers explain."The leakage can be exploited by a limited set of instructions, which is visible in all Intel generations starting from the 1st generation of Intel Core processors, independent of the OS and also works from within virtual machines and sandboxed environments."The issue is separate from the Spectre vulnerabilities, and is not addressed by existing mitigations.

As said here by Thomas Claburn