by WalterSobchak on 8/8/23, 5:27 PM with 336 comments
by BeeOnRope on 8/8/23, 9:13 PM
In principle it seems like the chipmakers should hold all the cards when it comes to discovery: they are experts in speculative execution, know exactly how their chips work and have massive existing validation suites, simulators and internal machine-readable specifications for the low-level operations of these chips.
Outside researches need to reverse all this by probing a black box (plus a few much-worse-than-insider sources like patents).
Yet years after the initial disclosures it's still random individuals or groups who are discovering these? Perhaps pre-Spectre this attack vector wasn't even considered, but once the general mechanism was obvious did the chip-makers not simply set their biggest brains down and say "go through this with a fine-toothed comb looking for other Spectre attacks"?
Maybe they did and are well aware of all these attacks but to save face and performance hits they simply hold on to them hoping nobody makes them public?
by mike_hearn on 8/8/23, 6:22 PM
https://www.intel.com/content/www/us/en/developer/articles/t...
General caveats: are there many clouds that still run workloads from different users on the same physical core? I thought most had changed their schedulers years ago so you can't get cross-domain leaks between hyperthreads anymore. Claiming that it affects all users on the internet seems like a massive over-exaggeration, as he hasn't demonstrated any kind of browser based exploit and even if such a thing did exist, it'd affect only a tiny minority of targeted users, as AFAIK many years after the introduction of Spectre nobody has ever found a specex attack in the wild (or have they?)
I think the more interesting thing here is that it continues the long run of speculation bugs that always seem to be patchable in microcode. When this stuff first appeared there was the looming fear that we'd have to be regularly junking and replacing the physical chips en masse, but has that ever been necessary? AFAIK all of the bugs could be addressed via a mix of software and microcode changes, sometimes at the cost of some performance in some cases. But there's never been a bug that needed new physical silicon (except for the early versions of AMD SEV, which were genuinely jailbroken in unpatchable ways).
by Negitivefrags on 8/8/23, 6:23 PM
There are really only two common cases for this anyway. VMs and JavaScript.
For VMs we just need to give up on it. Dedicate specific cores to specific VMs or at least customers.
For JavaScript it’s a bit harder.
Either way, we need to not be giving up performance for the the normal case.
by ndesaulniers on 8/8/23, 7:34 PM
Linux Kernel merge: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/lin...
by zerocrates on 8/8/23, 9:06 PM
Decided to look in the paper and "Intel states that newer CPUs such as Alder Lake, Raptor Lake, and Sapphire Rapids are unaffected, although not a security consideration and seems just a side effect of a significantly modified architecture." So basically they just randomly fixed it, or at least made this particular exploit nonworkable.
by v8xi on 8/8/23, 5:50 PM
Amazing how these vulnerabilities sit around unnoticed for years and then it takes two weeks for someone to code up an exploit.
by kzrdude on 8/8/23, 10:15 PM
on Linux, any cpus that don't have updated microcode will have AVX completely disabled as a mitigation for this issue. That's rather harsh if you ask me and would be very noticeable. Now I'm interested in finding out if I can get updated microcode..
by bironran on 8/8/23, 9:02 PM
by buildbot on 8/8/23, 5:33 PM
by CanaryLayout on 8/9/23, 1:02 AM
Hear me out: Instead of making SMT an all-or-nothing pre oposition, we have "lousy cores" where untrusted code goes and make the customer "prove" it should get elevation to the cores with SMT?
I dont't want to clobber my chip that's running the mega-important payroll jobs where no one can load anything else on to the board under pain of death. However I would like to be forced into tagging what is safe to run SMT else I get stuck on the safer cores.
I might be an intern who has no idea what any of this stuff means and goes to Google it, then learn what this attack vector truly is. Then makes a plan on how to defend against it.
Am I crazy?
by brundolf on 8/9/23, 5:20 AM
by baq on 8/8/23, 6:12 PM
> [A] Other processors have shared SRAM memory inside the core, such as hardware register files and fill buffers. Manufacturers must design shared memory units with extra care to prevent data from leaking across different security domains and invest more in security validation and testing.
Not sure what to make of this wording. Thinly veiled threat? Hint that other embargoes are in place?
by ngneer on 8/8/23, 7:45 PM
by sholladay on 8/9/23, 5:07 AM
How much slower would processors be if they got rid of all complex / risky optimizations? How much performance could we gain back with more expensive components, more integration (e.g. SoCs), and other approaches that are unlikely to lead to security problems?
by ancris on 8/8/23, 8:53 PM
by errantmind on 8/8/23, 9:14 PM
Be warned, apparently Grub had some kind of problem back in August 2022 and this pre-existing bug broke my boot completely when I updated grub for the above mitigation. I had to boot into a live ISO and reinstall grub to fix it.
by aestetix on 8/8/23, 6:40 PM
by entriesfull on 8/9/23, 7:00 AM
Theoretically, this can be mitigated permanently by disabling hyper-threading?
by samwillis on 8/8/23, 6:01 PM
by tomrod on 8/8/23, 5:47 PM
by GartzenDeHaes on 8/8/23, 6:53 PM
by throwaway892238 on 8/8/23, 6:36 PM
by Veserv on 8/8/23, 7:17 PM
Is the content of the temporal buffer just being blindly forwarded during speculative execution even if the indexed address of the attacking vpgather does not match?
Otherwise how is the speculative vpgather allowed to load the values of the temporal buffer?
If it is not blind is it a virtual address match? I guess it could also be a not-Present mapping physical match as well? I can not think of any other possibility off the top of my head.
If it is a blind forward that is pretty amazingly bad.
by Aaronmacaron on 8/8/23, 10:28 PM
by nwmcsween on 8/8/23, 6:07 PM
by tamimio on 8/8/23, 10:40 PM
- Is not affected
- Doesn’t support Win11
And both are good to know.
by isoprophlex on 8/9/23, 6:11 AM
by thewataccount on 8/8/23, 6:20 PM
by basedrum on 8/8/23, 10:38 PM
by xyst on 8/8/23, 10:32 PM
by bruce343434 on 8/8/23, 6:29 PM
by coding123 on 8/8/23, 10:45 PM
by Dalewyn on 8/8/23, 9:01 PM
EDIT: Maybe not? That linked table is very esoteric.
by EGreg on 8/8/23, 8:42 PM
by lefuturiste on 8/8/23, 10:17 PM
by SomeoneFromCA on 8/9/23, 1:22 PM
by yakkityyak on 8/8/23, 6:08 PM
by snvzz on 8/8/23, 10:33 PM
In the internet era, x86 is an anachronism.
RISC is the way forward.
RISC-V is inevitable.
by stalfosknight on 8/8/23, 6:05 PM
by galacticaactual on 8/8/23, 6:05 PM