[情報] 新的幽靈漏洞昨天被發佈

看板PC_Shopping (個人電腦購買)作者 (pigChu)時間3年前 (2022/03/09 12:58), 編輯推噓15(15024)
留言39則, 17人參與, 3年前最新討論串1/1
新聞來源: https://www.tomshardware.com/news/intel-alder-lake-arm-cpus-affected-by-new-spec tre-vulnerability 縮網址:https://bit.ly/3hOskDS 新的幽靈漏洞昨天被發佈, 這個屬於Specture-V2的漏洞,主要影響Intel跟Arm CPU系統, Intel從Haswell開始到Alderlake都有影響, 會出一個新的軟體更新去修正這問題, Arms則是影響Cortex A15, A57, A72 及 Neoverse V1, N1, and N2 可由Intel之 CVE-2022-0001、CVE-2022-0002 及 Arm 之 CVE-2022-23960 了解漏洞及修正 漏洞演示: https://twitter.com/vu5ec/status/1501256481097883648 https://youtu.be/537HUwV36ME
底下為原文: VUSec security research group and Intel on Tuesday disclosed a yet another Spect re-class speculative execution vulnerability called branch history injection (BH I). The new exploit affects all of Intel processors released in the recent years , including the latest Alder Lake CPUs, and select Arm cores. By contrast, AMD's chips are believed to be unaffected. BHI is a proof-of-concept attack that affects CPUs already vulnerable to Spectre V2 exploits, but with all kinds of mitigations already in place. The new exploi t bypasses Intel's eIBRS and Arm's CSV2 mitigations, reports Phoronix. BHI re-en ables cross-privilege Spectre-v2 exploits, allows kernel-to-kernel (so-called in tra-mode BTI) exploits, and allows perpetrators to inject predictor entries into the global branch prediction history to make kernel leak data, reports VUSec. A s a result, arbitrary kernel memory on select CPUs can be leaked and potentially reveal confidential information, including passwords. An example of how such a leak can happen was published here. VUSec 圖片我就不附上,因為有影片 (Image credit: VUSec) All of Intel's processors beginning with Haswell (launched in 2013) and extendin g to the latest Ice Lake-SP and Alder Lake are affected by the vulnerability, bu t Intel is about to release a software patch that will mitigate the issue. Numerous cores from Arm, including Cortex A15, A57, A72 as well as Neoverse V1, N1, and N2 are also affected. Arm is expected to release software mitigations f or its cores. What is unclear is whether custom versions of these cores (e.g., s elect cores from Qualcomm) are also affected and when the potential security hol es will be covered. Since this is a proof-of-concept vulnerability and it is being mitigated by Inte l and Arm, it should not be able to be used to attack a client or server machine — as long as all the latest patches are installed. There's no indication how m uch the mitigations will impact performance. ---------- https://i.imgur.com/RVYbywG.jpg
---- Sent from BePTT on my SHARP FS8002 -- ※ 發信站: 批踢踢實業坊(ptt.cc), 來自: 49.216.134.64 (臺灣) ※ 文章網址: https://www.ptt.cc/bbs/PC_Shopping/M.1646801901.A.FFE.html

03/09 13:00, 3年前 , 1F
是AMD運氣好嗎?常常都沒他的事
03/09 13:00, 1F

03/09 13:00, 3年前 , 2F
架構不同,分支預測做法不同
03/09 13:00, 2F

03/09 13:01, 3年前 , 3F
不會說都沒有,但是會比較少
03/09 13:01, 3F

03/09 13:12, 3年前 , 4F
03/09 13:12, 4F

03/09 13:12, 3年前 , 5F
其實沒有比較少,只是沒人無聊一直
03/09 13:12, 5F

03/09 13:13, 3年前 , 6F
貼。這一個還算蠻有趣的
03/09 13:13, 6F

03/09 13:21, 3年前 , 7F
AMD自己bug就夠搞了
03/09 13:21, 7F

03/09 13:34, 3年前 , 8F
Designer: 又要多浪費電晶體了
03/09 13:34, 8F

03/09 13:36, 3年前 , 9F
一直都有,看大不大條和好不好修而
03/09 13:36, 9F

03/09 13:36, 3年前 , 10F
已,以前的漏洞是修完-50%效能才被
03/09 13:36, 10F

03/09 13:36, 3年前 , 11F
03/09 13:36, 11F

03/09 13:40, 3年前 , 12F
AMD被炮是因為效能原本就沒有intel
03/09 13:40, 12F

03/09 13:41, 3年前 , 13F
好 修完BUG例如當年TLB BUG效能
03/09 13:41, 13F

03/09 13:41, 3年前 , 14F
又更少
03/09 13:41, 14F

03/09 13:43, 3年前 , 15F
安全漏洞無感吧 用AMD的很少
03/09 13:43, 15F

03/09 13:43, 3年前 , 16F
的人
03/09 13:43, 16F

03/09 13:51, 3年前 , 17F
i皇「跟上!! AMD快跟上!!」
03/09 13:51, 17F

03/09 13:54, 3年前 , 18F
I皇就靠漏洞偷效能
03/09 13:54, 18F

03/09 13:58, 3年前 , 19F
當年分支預測漏洞號稱修補後最多會
03/09 13:58, 19F

03/09 13:58, 3年前 , 20F
降20%效能,但是實測之後影響很小
03/09 13:58, 20F

03/09 13:58, 3年前 , 21F
不過這個一系列漏洞的確打亂了i社
03/09 13:58, 21F

03/09 13:59, 3年前 , 22F
的處理器布局,黑暗的九代U大部分都
03/09 13:59, 22F

03/09 13:59, 3年前 , 23F
拿掉了HT,整個市場定位亂掉
03/09 13:59, 23F

03/09 14:00, 3年前 , 24F
九代可以說是最亂的一代
03/09 14:00, 24F

03/09 14:20, 3年前 , 25F
打了補丁又要降幾%效能
03/09 14:20, 25F

03/09 14:23, 3年前 , 26F
原來是宣稱喔?我還以為是真的 XD
03/09 14:23, 26F

03/09 14:29, 3年前 , 27F
那時很多團隊都測試過了,是有影響
03/09 14:29, 27F

03/09 14:29, 3年前 , 28F
但是對於一般user的影響很小。分支
03/09 14:29, 28F

03/09 14:30, 3年前 , 29F
預測的漏洞影響最大的是server用戶
03/09 14:30, 29F

03/09 14:30, 3年前 , 30F
當時比較擔心的是ssh key會被這種小
03/09 14:30, 30F

03/09 14:31, 3年前 , 31F
刀掘牆滴水穿石的方式偷走。但以結
03/09 14:31, 31F

03/09 14:31, 3年前 , 32F
果而言,駭客寧願去選更有效率的方
03/09 14:31, 32F

03/09 14:32, 3年前 , 33F
03/09 14:32, 33F

03/09 14:35, 3年前 , 34F
e3 1231 v3被吃很多校能幹
03/09 14:35, 34F

03/09 15:33, 3年前 , 35F
03/09 15:33, 35F

03/09 15:33, 3年前 , 36F
之前九代 還更新了步進從硬體層面修
03/09 15:33, 36F

03/09 17:07, 3年前 , 37F
Xeon E5 那時候I/O影響比較大
03/09 17:07, 37F

03/09 17:09, 3年前 , 38F
12代分支預測已經改良過了
03/09 17:09, 38F

03/10 23:13, 3年前 , 39F
又有漏洞了喔...
03/10 23:13, 39F
文章代碼(AID): #1YA3Fj_- (PC_Shopping)
文章代碼(AID): #1YA3Fj_- (PC_Shopping)