Tuesday, September 26, 2023
Kiratas
  • Home
  • World
  • Lifestyle

    Trending Tags

    • Pandemic
  • Business
  • Entertainment
  • Sports
No Result
View All Result
  • Home
  • World
  • Lifestyle

    Trending Tags

    • Pandemic
  • Business
  • Entertainment
  • Sports
No Result
View All Result
Kiratas
No Result
View All Result
Home World

New vulnerabilities discovered in AMD and Intel processors

Eliza Houghton by Eliza Houghton
August 9, 2023
in World
0
New vulnerabilities discovered in AMD and Intel processors
0
SHARES
3
VIEWS
Share on FacebookShare on Twitter

New vulnerabilities discovered in AMD and Intel processors

AMD and Intel provide microcode and firmware updates for numerous processors that are intended to help against newly discovered security gaps. Above all, this affects the vulnerability known as Inception in Ryzen and Epyc CPUs from AMD and a downfall in the case of Intel.

Advertisement

Both attacks rely on Specter and Meltdown, but bypass previous security patches. They are primarily relevant for operators of cloud data centers on whose servers different customers run their respective software in parallel. Comparable attacks on desktop PCs and notebooks are possible, but unrealistic – data can be accessed more easily there thanks to direct access.

Downfall with Meltdown roots

Downfall (CVE-2023-32543, medium classification 6.5) overflows memory areas in order to read data from external processes. However, for this to work, the downfall malware and its victim process must be running on the same CPU core. But then downfall also works with active Software Guard Extensions (SGX), which are actually supposed to protect sensitive data better (Confidential Computing in Trusted Execution Environments/TEE). Of course, many cloud instances are tailored in such a way that several of them do not run on the same CPU cores.

While previous Meltdown attacks were aimed at the data caches of the CPU cores, Downfall attacks the SIMD units. SIMD stands for “Single Instruction, Multiple Data”, because it allows the CPU to apply individual instructions to a complete data vector, which then executes the tasks on all lanes assigned to it at the same time.

Google security researcher Daniel Moghimi found that the Gather instruction leaks data from the SIMD vector register at 5.7 KB/s. The Gather Data Sampling (GDS) type of attack uses cryptographic keys, for example.

Gather Value Injection (GVI) goes one step further and combines the Gather command with the Load Value Injection (LVI) attack type. GVI looks for a Gather instruction in the victim process and puts its own data value under it.

As Moghimi writes in his Downfall paper: “For example, if a program executes the Gather statement and uses its output to index into another allocated memory, an attacker can force the program to access out-of-bounds data by it injects stale memory indexes into Gather during transient execution to leak any data outside of that allocation and out of the victim’s address space.”

Advertisement

Inception with Specter roots

All Zen processors from AMD, including the current Zen 4 models (Epyc 9004, Ryzen 7000), are susceptible to the Inception attack. This new spin from security researchers at ETH Zurich shows once again that Specter-style attacks on AMD CPUs are complicated, but not impossible.

Inception (CVE-2023-20569, medium rating) combines the techniques of phantom speculation (Spectre) with transient execution. The attack disguises any binary operations (so-called XOR instructions) as recursive call commands. It triggers incorrect branch predictions and overflows the return stack buffer. The attacker can determine the target memory address to which the processor writes the data.

svg%3E

Block diagram of the Inception attack.

(Image: Daniël Trujillo, Johannes Wikner, Kaveh Razavi)

Many – including current – ​​processors are affected

All Intel processors from the Skylake to Tiger or Rocket Lake generations are affected by the downfall, including various server CPUs such as the Xeon Platinum 8180. According to the list of manufacturers, Alder Lake, Raptor Lake and the server offshoots Sapphire Rapids are not susceptible. Intel mitigates the vulnerability with the lfence command so that the data is no longer passed on after a gather instruction.

AMD mitigates inception by directing all incorrect branch predictions to the same initial state in the execution chain. This jump back also leads to an incorrect result, which can, however, be checked. This should cost significantly less performance than emptying the CPU pipeline in the event of an incorrect branch prediction (flush).

If you want to be on the safe side, you can still empty the pipeline. AGESA updates only come for Zen 3 and Zen 4 processors because the necessary flush instruction is missing there.

Intel lists some other security vulnerabilities with medium ratings in its Security Advisories of August 8th. This applies to the Unite Android app, the Intelligent Test System (ITS) tool and the MAVinci software for the Falcon 8+ drone. IST and MAVinci are discontinued by Intel – there are no updates. Unite receives a security patch.

Intel also closes some BIOS vulnerabilities. In turn, the manufacturers of mainboards and PCs have to enter the updates into their own product-specific firmware updates, sign them and make them available for download.

(mma)

Go to home page
#vulnerabilities #discovered #AMD #Intel #processors

Tags: AMDAMD EpycdiscoveredIntelMeltdown and SpectreProcessorsSecurityVulnerabilitiesXeon
Previous Post

Macho murder in Pozoblanco: “He had the moving van ready for nine o’clock, and at eight he killed her”

Next Post

Euronews Today | The keys of the day in this 15-minute video

Eliza Houghton

Eliza Houghton

Related Posts

Please pay!  78 revolutions per minute – spin of the first record
World

Please pay! 78 revolutions per minute – spin of the first record

by Eliza Houghton
September 26, 2023
Education allocates 816 million this year to arrange private classrooms
World

Education allocates 816 million this year to arrange private classrooms

by Eliza Houghton
September 26, 2023
Chilean politics tries against the clock to save the constituent process
World

Chilean politics tries against the clock to save the constituent process

by Eliza Houghton
September 26, 2023
Software development: Attackers can steal source code via the TeamCity vulnerability
World

Software development: Attackers can steal source code via the TeamCity vulnerability

by Eliza Houghton
September 26, 2023
Markel Zubizarreta leaves the sports management of the women’s FC Barcelona
World

Markel Zubizarreta leaves the sports management of the women’s FC Barcelona

by Eliza Houghton
September 26, 2023
Next Post
Euronews Today |  The keys of the day in this 15-minute video

Euronews Today | The keys of the day in this 15-minute video

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Premium Content

Does it make sense to mix two or more flavors of ice cream?

Does it make sense to mix two or more flavors of ice cream?

August 20, 2023
Urkullu asks the Government to favor the “institutionalized” participation of the Basque Country in Europe

Urkullu asks the Government to favor the “institutionalized” participation of the Basque Country in Europe

September 11, 2023
Supply chain security: How much standard is in SBOMs?

Supply chain security: How much standard is in SBOMs?

August 15, 2023

Browse by Category

  • Science
  • Sports
  • World

Browse by Tags

Apple Artificial Intelligence attacks China Court Cup data Death due Feijóo Germany Google government investiture iOS iPhone law live Madrid man Microsoft million news people police President Pro Rubiales Russia Russia-Ukraine invasion Security Software development Spain Spanish Sánchez time Today Ukraine Updates video Vulnerabilities war workshop world years
Kiratas

Latest News from World, Health, Politics, Sports, Business, Education, Technology, Arts and Latin America, the Middle East, South Asia.

Categories

  • Science
  • Sports
  • World

Browse by Tag

Apple Artificial Intelligence attacks China Court Cup data Death due Feijóo Germany Google government investiture iOS iPhone law live Madrid man Microsoft million news people police President Pro Rubiales Russia Russia-Ukraine invasion Security Software development Spain Spanish Sánchez time Today Ukraine Updates video Vulnerabilities war workshop world years

Recent Posts

  • Please pay! 78 revolutions per minute – spin of the first record
  • Education allocates 816 million this year to arrange private classrooms
  • Chilean politics tries against the clock to save the constituent process
  • About Us
  • Home
  • Privacy Policy
  • Terms and Conditions

© Aroged 2023. All Rights Reserved.

No Result
View All Result
  • Home
  • Landing Page
  • Buy JNews
  • Support Forum
  • Contact Us

© Aroged 2023. All Rights Reserved.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.