Meltdown and spectre

SgxPectre Attacks: Practical Spectre attacks against Intel’s SGX enclaves
Intel mitigation could be ready on March 16th.

Kernel Side-Channel Attack using Speculative Store Bypass - CVE-2018-3639

https://news.softpedia.com/news/rhel-and-centos-linux-7-receive-mitigations-for-spectre-variant-4-vulnerability-521249.shtml

3 Likes

Some says that speculative execution exploitation is old news.

https://www.ncsc.admin.ch/ncsc/en/home/infos-fuer/infos-it-spezialisten/themen/schwachstelle-melden/advisories.html

Yeah, sure. Count on it.

More on that

According to this article…

According to VMWare, RetBleed Linux mitigations included in kernel 5.19 are “not irrelevant” as performance drop compared to kernel 5.18. And this on several CPU generations…

Retbleed impacts Intel Core CPUs from generation 6 (Skylake - 2015) through 8 (Coffee Lake - 2017) and AMD Zen 1, Zen 1+, and Zen 2 processors released between 2017 and 2019, which are still omnipresent in server systems.

Adding insult to injury

For now, the Linux kernel development team hasn’t discussed the massive performance impact nor promised to revisit the mitigations and implement a more “surgical” fix, so the situation remains risky.

Several know enthusiasts of computer defined 10th and 11th generation of Intel Core CPU quite a waste of silicon; I’d love to second opinion that after these nice so called fixes.

Sunnyvale… not the correct way to say “Happy new Year”.
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1031
Cr4p!

https://www.intel.com/content/www/us/en/developer/topic-technology/software-security-guidance/processors-affected-consolidated-product-cpu-model.html#tab-blade-1-0

Downfall. The table of affected hardware straigth from Santa Clara.

1 Like

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00950.html

New vulnerabilities arise…

1 Like