TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Downfall Attacks

1328 pointsby WalterSobchakalmost 2 years ago

40 comments

BeeOnRopealmost 2 years ago
What I find odd is that after the initial Spectre attacks, there have been a long string of these attacks discovered by outside researchers and then patched by the chipmakers.<p>In principle it seems like the chipmakers should hold all the cards when it comes to discovery: they are experts in speculative execution, know exactly how their chips work and have massive existing validation suites, simulators and internal machine-readable specifications for the low-level operations of these chips.<p>Outside researches need to reverse all this by probing a black box (plus a few much-worse-than-insider sources like patents).<p>Yet years after the initial disclosures it&#x27;s still random individuals or groups who are discovering these? Perhaps pre-Spectre this attack vector wasn&#x27;t even considered, but once the general mechanism was obvious did the chip-makers not simply set their biggest brains down and say &quot;go through this with a fine-toothed comb looking for other Spectre attacks&quot;?<p>Maybe they <i>did</i> and are well aware of all these attacks but to save face and performance hits they simply hold on to them hoping nobody makes them public?
评论 #37055603 未加载
评论 #37055727 未加载
评论 #37059859 未加载
评论 #37057001 未加载
评论 #37061168 未加载
评论 #37055965 未加载
评论 #37055621 未加载
评论 #37058799 未加载
评论 #37057511 未加载
评论 #37057082 未加载
评论 #37055729 未加载
评论 #37056457 未加载
评论 #37056917 未加载
评论 #37055937 未加载
评论 #37056402 未加载
评论 #37057451 未加载
评论 #37058894 未加载
评论 #37056923 未加载
评论 #37056327 未加载
评论 #37055597 未加载
评论 #37060254 未加载
评论 #37056305 未加载
评论 #37055616 未加载
评论 #37056840 未加载
评论 #37059074 未加载
评论 #37056358 未加载
评论 #37056979 未加载
评论 #37057847 未加载
评论 #37056418 未加载
评论 #37059009 未加载
评论 #37058150 未加载
mike_hearnalmost 2 years ago
The Intel paper link is dead, this seems to be the right one:<p><a href="https:&#x2F;&#x2F;www.intel.com&#x2F;content&#x2F;www&#x2F;us&#x2F;en&#x2F;developer&#x2F;articles&#x2F;technical&#x2F;software-security-guidance&#x2F;technical-documentation&#x2F;gather-data-sampling.html?wapkw=gather%20data%20sampling" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.intel.com&#x2F;content&#x2F;www&#x2F;us&#x2F;en&#x2F;developer&#x2F;articles&#x2F;t...</a><p>General caveats: are there many clouds that still run workloads from different users on the same physical core? I thought most had changed their schedulers years ago so you can&#x27;t get cross-domain leaks between hyperthreads anymore. Claiming that it affects all users on the internet seems like a massive over-exaggeration, as he hasn&#x27;t demonstrated any kind of browser based exploit and even if such a thing did exist, it&#x27;d affect only a tiny minority of targeted users, as AFAIK many years after the introduction of Spectre nobody has ever found a specex attack in the wild (or have they?)<p>I think the more interesting thing here is that it continues the long run of speculation bugs that always seem to be patchable in microcode. When this stuff first appeared there was the looming fear that we&#x27;d have to be regularly junking and replacing the physical chips en masse, but has that ever been necessary? AFAIK all of the bugs could be addressed via a mix of software and microcode changes, sometimes at the cost of some performance in some cases. But there&#x27;s never been a bug that needed new physical silicon (except for the early versions of AMD SEV, which were genuinely jailbroken in unpatchable ways).
评论 #37054791 未加载
评论 #37053480 未加载
评论 #37054413 未加载
评论 #37054435 未加载
评论 #37054271 未加载
评论 #37054377 未加载
评论 #37054498 未加载
Negitivefragsalmost 2 years ago
Once again it seems clear that running code from two security domains on the same physical processor cores is just not possible to get right, and we should probably just stop doing it.<p>There are really only two common cases for this anyway. VMs and JavaScript.<p>For VMs we just need to give up on it. Dedicate specific cores to specific VMs or at least customers.<p>For JavaScript it’s a bit harder.<p>Either way, we need to not be giving up performance for the the normal case.
评论 #37053398 未加载
评论 #37055979 未加载
评论 #37214963 未加载
评论 #37055082 未加载
评论 #37054059 未加载
评论 #37056109 未加载
评论 #37053517 未加载
评论 #37059568 未加载
评论 #37053994 未加载
评论 #37056558 未加载
评论 #37055313 未加载
评论 #37053427 未加载
评论 #37053956 未加载
ndesaulniersalmost 2 years ago
Intel Security Advisory: <a href="https:&#x2F;&#x2F;www.intel.com&#x2F;content&#x2F;www&#x2F;us&#x2F;en&#x2F;developer&#x2F;articles&#x2F;technical&#x2F;software-security-guidance&#x2F;technical-documentation&#x2F;gather-data-sampling.html" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.intel.com&#x2F;content&#x2F;www&#x2F;us&#x2F;en&#x2F;developer&#x2F;articles&#x2F;t...</a><p>Linux Kernel merge: <a href="https:&#x2F;&#x2F;git.kernel.org&#x2F;pub&#x2F;scm&#x2F;linux&#x2F;kernel&#x2F;git&#x2F;torvalds&#x2F;linux.git&#x2F;commit&#x2F;?id=64094e7e3118aff4b0be8ff713c242303e139834" rel="nofollow noreferrer">https:&#x2F;&#x2F;git.kernel.org&#x2F;pub&#x2F;scm&#x2F;linux&#x2F;kernel&#x2F;git&#x2F;torvalds&#x2F;lin...</a>
zerocratesalmost 2 years ago
Only up to 11th gen... it didn&#x27;t seem like this could have been disclosed to Intel soon enough for them to have fixed it for 12th gen, so had they just happened to fix it while fixing something else, or what?<p>Decided to look in the paper and &quot;Intel states that newer CPUs such as Alder Lake, Raptor Lake, and Sapphire Rapids are unaffected, although not a security consideration and seems just a side effect of a significantly modified architecture.&quot; So basically they just randomly fixed it, or at least made this particular exploit nonworkable.
评论 #37057905 未加载
评论 #37060734 未加载
v8xialmost 2 years ago
From FAQ: [Q] How long have users been exposed to this vulnerability? [A] At least nine years. The affected processors have been around since 2014.<p>Amazing how these vulnerabilities sit around unnoticed for years and then it takes two weeks for someone to code up an exploit.
评论 #37052926 未加载
评论 #37053198 未加载
评论 #37056384 未加载
kzrdudealmost 2 years ago
See this LWN story: <a href="https:&#x2F;&#x2F;lwn.net&#x2F;Articles&#x2F;940783&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;lwn.net&#x2F;Articles&#x2F;940783&#x2F;</a><p>on Linux, any cpus that don&#x27;t have updated microcode will have AVX completely disabled as a mitigation for this issue. That&#x27;s rather harsh if you ask me and would be very noticeable. Now I&#x27;m interested in finding out if I can get updated microcode..
评论 #37058135 未加载
评论 #37057403 未加载
评论 #37057321 未加载
bironranalmost 2 years ago
Worth to note that GCP has this patched (<a href="https:&#x2F;&#x2F;cloud.google.com&#x2F;support&#x2F;bulletins#gcp-2023-024" rel="nofollow noreferrer">https:&#x2F;&#x2F;cloud.google.com&#x2F;support&#x2F;bulletins#gcp-2023-024</a>)
评论 #37056225 未加载
评论 #37058778 未加载
buildbotalmost 2 years ago
This is a huge performance hit - up to 50% it is claimed! 70% of modern intel processors are affected apparently as well.
评论 #37053602 未加载
评论 #37053500 未加载
评论 #37053006 未加载
评论 #37053187 未加载
评论 #37054576 未加载
评论 #37055369 未加载
CanaryLayoutalmost 2 years ago
The NES incorporated a chipset that buried an entire 6502 inside. You can get a Rockchip ARM chip for the price of a pizza that incorporates mixed cores on the die. Maybe the chipmakers don&#x27;t NEED to solve every edge case until the end of time, but delegate side channel attack mitigations like this back to the chipgobblers (us).<p>Hear me out: Instead of making SMT an all-or-nothing pre oposition, we have &quot;lousy cores&quot; where untrusted code goes and make the customer &quot;prove&quot; it should get elevation to the cores with SMT?<p>I dont&#x27;t want to clobber my chip that&#x27;s running the mega-important payroll jobs where no one can load anything else on to the board under pain of death. However I would like to be forced into tagging what is safe to run SMT else I get stuck on the safer cores.<p>I might be an intern who has no idea what any of this stuff means and goes to Google it, then learn what this attack vector truly is. Then makes a plan on how to defend against it.<p>Am I crazy?
评论 #37066675 未加载
brundolfalmost 2 years ago
Speculative execution seems like a never-ending rabbit hole of vulnerabilities. Though I feel like most of them end up being in Intel chips for some reason
baqalmost 2 years ago
&gt; [Q] Should other processor vendors and designers be concerned?<p>&gt; [A] Other processors have shared SRAM memory inside the core, such as hardware register files and fill buffers. Manufacturers must design shared memory units with extra care to prevent data from leaking across different security domains and invest more in security validation and testing.<p>Not sure what to make of this wording. Thinly veiled threat? Hint that other embargoes are in place?
评论 #37053613 未加载
评论 #37053226 未加载
ngneeralmost 2 years ago
I do not doubt the severity of the flaw, but most practical attacks end up being far more mundane. Consider SolarWinds, for example. No dazzling tricks needed, whatever gets the job done.
评论 #37070719 未加载
评论 #37058526 未加载
sholladayalmost 2 years ago
It feels like chipmakers never learned to &quot;Make it work, make it right, make it fast&quot;, in that order. But then, hindsight is 20&#x2F;20.<p>How much slower would processors be if they got rid of all complex &#x2F; risky optimizations? How much performance could we gain back with more expensive components, more integration (e.g. SoCs), and other approaches that are unlikely to lead to security problems?
评论 #37061323 未加载
ancrisalmost 2 years ago
At this rate, with all these vulnerabilities and mitigations, we&#x27;ll rollback CPU performance back at least 10 years.
评论 #37057393 未加载
评论 #37055804 未加载
评论 #37055387 未加载
评论 #37061247 未加载
errantmindalmost 2 years ago
The Linux mitigation can be disabled with gather_data_sampling=off in the kernel boot parameters.<p>Be warned, apparently Grub had some kind of problem back in August 2022 and this pre-existing bug broke my boot completely when I updated grub for the above mitigation. I had to boot into a live ISO and reinstall grub to fix it.
评论 #37058680 未加载
评论 #37055634 未加载
aestetixalmost 2 years ago
I just did a cursory readthrough. Am I correct to think this feels a bit like heartbleed, but for CPU registers rather than memory?
entriesfullalmost 2 years ago
So this is literally the same thing as AMD&#x27;s Zenbleed vulnerability? Ridiculous how these companies make so much money and are completely incompetent at handling security.<p>Theoretically, this can be mitigated permanently by disabling hyper-threading?
samwillisalmost 2 years ago
Ouch, I wander if they received a bug bounty from Intel for this...
tomrodalmost 2 years ago
Geez! This seems like a _really_ big attack vector. Anyone on the security side have some caveats?
评论 #37053025 未加载
GartzenDeHaesalmost 2 years ago
How could an attacker gain the level of knowledge necessary to accomplish this without compromising the target process?
评论 #37054254 未加载
throwaway892238almost 2 years ago
This is one of many similar previous attacks, and more of these attacks will continue to come out and be increasingly weaponized. From now on the assumption must be that same-core computing is not secure.
Veservalmost 2 years ago
I am a little unclear on the attack. What data in the temporal buffer is being forwarded to the attacking vpgather?<p>Is the content of the temporal buffer just being blindly forwarded during speculative execution even if the indexed address of the attacking vpgather does not match?<p>Otherwise how is the speculative vpgather allowed to load the values of the temporal buffer?<p>If it is not blind is it a virtual address match? I guess it could also be a not-Present mapping physical match as well? I can not think of any other possibility off the top of my head.<p>If it is a blind forward that is pretty amazingly bad.
评论 #37061147 未加载
Aaronmacaronalmost 2 years ago
Are there any known attacks which exploited Spectre or Meltdown vulnerabilities? And is it likely that this vulnerability will be successfully used to perform attacks?
nwmcsweenalmost 2 years ago
Haven&#x27;t RTFA but would zeroing registers fix this (-mzero-caller-saved-regs=used)?
评论 #37054245 未加载
评论 #37053842 未加载
tamimioalmost 2 years ago
So my CPU from 2015 (CPUID 306C3)<p>- Is not affected<p>- Doesn’t support Win11<p>And both are good to know.
isoprophlexalmost 2 years ago
I guess Moore&#x27;s law isn&#x27;t exactly dead, but it doesn&#x27;t seem to be alive either... Moore&#x27;s law is undead?
thewataccountalmost 2 years ago
Does anyone know what type of workloads this effects the performance of the most? Is this specialty-type of workloads or are general webserver&#x2F;database&#x2F;coding&#x2F;compiling&#x2F;gaming&#x2F;desktop usages effected?
评论 #37070226 未加载
basedrumalmost 2 years ago
Can someone explain why the ssh video at 2:25, where the 256bit comparison is pasted in, it doesn&#x27;t match? The first two colon separated number sets do match, but not the following two?
评论 #37056970 未加载
xystalmost 2 years ago
So it seems like speculative execution cannot be disabled. What’s the mitigation here? Nothing and wait for patch or significant redesign?
评论 #37056401 未加载
bruce343434almost 2 years ago
Is there an overview page of all these processor data leak bugs the last 10 years? It feels like there has been an enormous surge in them.
评论 #37053554 未加载
评论 #37058230 未加载
评论 #37056288 未加载
coding123almost 2 years ago
I guess 1995 is calling when computers were expensive.
Dalewynalmost 2 years ago
Am I correct in understanding this affects basically every CPU generation up to and including Alder Lake?<p>EDIT: Maybe not? That linked table is very esoteric.
评论 #37056641 未加载
EGregalmost 2 years ago
How can the registers still hold this info when users switch? I would think that it is very transitory, and wiped by other stuff quickly
评论 #37058088 未加载
lefuturistealmost 2 years ago
As I see, there is no debian security release yet?
评论 #37060573 未加载
SomeoneFromCAalmost 2 years ago
Similar to Zenbleed judging by description.
yakkityyakalmost 2 years ago
Not again!
snvzzalmost 2 years ago
ISA complexity breeds microarchitecture bugs.<p>In the internet era, x86 is an anachronism.<p>RISC is the way forward.<p>RISC-V is inevitable.
评论 #37057411 未加载
stalfosknightalmost 2 years ago
I&#x27;m getting annoyed with all of these yawning security holes in Intel&#x27;s CPUs. I&#x27;m tempted to replace my Intel MacBook Pro with an Apple Silicon model sooner than I normally would.
评论 #37053214 未加载
评论 #37053543 未加载
评论 #37053445 未加载
galacticaactualalmost 2 years ago
Stop. Releasing. Attack research. Without. Detection strategies.
评论 #37053206 未加载
评论 #37053212 未加载
评论 #37055675 未加载
评论 #37053146 未加载
评论 #37053372 未加载
评论 #37053337 未加载