TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Branch Privilege Injection: Exploiting branch predictor race conditions

421 pointsby alberto-m11 days ago
See also: <i>ETH Zurich researchers discover new security vulnerability in Intel processors</i> - <a href="https:&#x2F;&#x2F;ethz.ch&#x2F;en&#x2F;news-and-events&#x2F;eth-news&#x2F;news&#x2F;2025&#x2F;05&#x2F;eth-zurich-researchers-discover-new-security-vulnerability-in-intel-processors.html" rel="nofollow">https:&#x2F;&#x2F;ethz.ch&#x2F;en&#x2F;news-and-events&#x2F;eth-news&#x2F;news&#x2F;2025&#x2F;05&#x2F;eth...</a>

23 comments

progval11 days ago
Researchers&#x27; blog post: <a href="https:&#x2F;&#x2F;comsec.ethz.ch&#x2F;research&#x2F;microarch&#x2F;branch-privilege-injection&#x2F;" rel="nofollow">https:&#x2F;&#x2F;comsec.ethz.ch&#x2F;research&#x2F;microarch&#x2F;branch-privilege-i...</a><p>Paper: <a href="https:&#x2F;&#x2F;comsec.ethz.ch&#x2F;wp-content&#x2F;files&#x2F;bprc_sec25.pdf" rel="nofollow">https:&#x2F;&#x2F;comsec.ethz.ch&#x2F;wp-content&#x2F;files&#x2F;bprc_sec25.pdf</a>
评论 #43975793 未加载
评论 #43975228 未加载
评论 #43975655 未加载
eigenform11 days ago
Great read! Some boiled-down takeaways:<p>- Predictor updates may be deferred until sometime <i>after</i> a branch retires. Makes sense, otherwise I guess you&#x27;d expect that branches would take longer to retire!<p>- Dispatch-serializing instructions don&#x27;t stall the pipeline for pending updates to predictor state. Also makes sense, considering you&#x27;ve already made a distinction between &quot;committing the result of the branch instruction&quot; and &quot;committing the result of the prediction&quot;.<p>- Privilege-changing instructions don&#x27;t stall the pipeline for pending updates either. Also makes sense, but only if you can guarantee that the privilege level is consistent between making&#x2F;committing a prediction. Otherwise, you might be creating a situation where predictions generated by code in one privilege level may be committed to state used in a different one?<p>Maybe this is hard because &quot;current privilege level&quot; is not a single unambiguous thing in the pipeline?
mettamage11 days ago
Good to see Kaveh Razavi, he used to teach at my uni in the Vrije Universiteit in Amsterdam :) The course Hardware Security was crazy cool and delved into stuff lijke this.
评论 #43975557 未加载
rakingleaves11 days ago
Anyone know how this relates to the Training Solo attack that was just disclosed? <a href="https:&#x2F;&#x2F;www.vusec.net&#x2F;projects&#x2F;training-solo&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.vusec.net&#x2F;projects&#x2F;training-solo&#x2F;</a>
评论 #43981960 未加载
rini1711 days ago
If CPU brach predictor had bits of information readily available to check buffer boundaries and privilege level of the code, all this would be much easier to prevent. But apparently that will only happen when we pry out the void* from the cold C programmers&#x27; hands and start enriching our pointers with vital information.
评论 #43975546 未加载
评论 #43976080 未加载
评论 #43976685 未加载
layer811 days ago
Intel security advisory: <a href="https:&#x2F;&#x2F;www.intel.com&#x2F;content&#x2F;www&#x2F;us&#x2F;en&#x2F;security-center&#x2F;advisory&#x2F;intel-sa-01247.html" rel="nofollow">https:&#x2F;&#x2F;www.intel.com&#x2F;content&#x2F;www&#x2F;us&#x2F;en&#x2F;security-center&#x2F;advi...</a>
rtkwe11 days ago
I wonder if there&#x27;s similar gaps in AMD hardware? Seems like speculative execution is simply an extremely hard to patch vulnerability in a share processor space so I wonder how AMD has avoided it.
评论 #43975163 未加载
评论 #43975227 未加载
评论 #43975310 未加载
评论 #43976092 未加载
smartmic11 days ago
&gt; Closing these sorts of gaps requires a special update to the processor’s microcode. This can be done via a BIOS or operating system update and should therefore be installed on our PCs in one of the latest cumulative updates from Windows.<p>Why mention only Windows, what about Linux users?
评论 #43976083 未加载
评论 #43975891 未加载
margorczynski11 days ago
I wonder if there&#x27;s any way to recover for Intel. They don&#x27;t have anything worthwhile on the market, R&amp;D takes a lot of time and their foundries are a constant source of losses as they&#x27;re inferior compared to the competition.<p>On top of that x86 seems to be pushed out more and more by ARM hardware and now increasingly RISC-V from China. But of course there&#x27;s the US chip angle - will the US, especially after the problems during Covid, let a key manufacturer like Intel bite the dust?
评论 #43975586 未加载
评论 #43975577 未加载
评论 #43975652 未加载
评论 #43975384 未加载
yonatan807011 days ago
Just to make sure I got this right, at this point in time there are patches out for all major operating systems that can mitigate this&#x2F;apply relevant microcode to mitigate it?
评论 #43979444 未加载
HeliumHydride11 days ago
<a href="https:&#x2F;&#x2F;scholar.harvard.edu&#x2F;files&#x2F;mickens&#x2F;files&#x2F;theslowwinter.pdf" rel="nofollow">https:&#x2F;&#x2F;scholar.harvard.edu&#x2F;files&#x2F;mickens&#x2F;files&#x2F;theslowwinte...</a><p>&quot;Unfortunately for John, the branches made a pact with Satan and quantum mechanics [...] In exchange for their last remaining bits of entropy, the branches cast evil spells on future generations of processors. Those evil spells had names like “scaling-induced voltage leaks” and “increasing levels of waste heat” [...] the branches, those vanquished foes from long ago, would have the last laugh.&quot;
评论 #43976091 未加载
评论 #43979888 未加载
评论 #43976379 未加载
20198411 days ago
<p><pre><code> mitigations=off </code></pre> Don&#x27;t care.
评论 #43976057 未加载
tannhaeuser11 days ago
&gt; <i>All intel processors since the 9th generation (Coffee Lake Refresh) are affected by Branch Privilege Injection. However, we have observed predictions bypassing the Indirect Branch Prediction Barrier (IBPB) on processors as far back as 7th generation (Kaby Lake).</i><p>From that piece of text on the blog, I don‘t quite unterstand if Kaby Lake CPUs are affected or not.
评论 #43976003 未加载
评论 #43975789 未加载
Alcatros55211 days ago
As it seems a lot of people are not aware that this one is a newer generation of branch predictor issue. You can see that Intels eIBRS doesn&#x27;t mitigate the problems and make them susceptible to attacks. To prevent bigger issues the issue was released after Intel has been informed of the Issue and most systems are patched in the meantime.
dzdt11 days ago
The end-user processor slowdowns from Spectre and Meltdown mitigations were fairly substantial. Has anyone seen an estimate of how much the microcode updates for this new speculative vulnerability are going to cost in terms of slowdown?
评论 #43975775 未加载
j4511 days ago
Since the cloud is someone else&#x27;s computer, and someone else&#x27;s shared CPU, is cloud hosting (including vps) potentially impacted?<p>Look forward to learning how this can be meaningfully mitigated.
评论 #43975649 未加载
评论 #43976015 未加载
The28thDuck11 days ago
Haven’t we been here before? It seems like it’s very similar to the branch prediction exploits of the late 2010s. Is there something particularly novel about this class of exploits?
评论 #43977582 未加载
评论 #43979452 未加载
x3al10 days ago
Is there an easy way to run a browser on some phone&#x2F;tablet and everything else on a desktop just to isolate the web and JS from accessing your desktop?
pawanjswal11 days ago
Just when we thought Spectre was fading, it pulls a full sequel—Intel CPUs still keeping things spicy!
arkh10 days ago
So is it time for some cryptography coprocessor &#x2F; cards?
gitroom11 days ago
yeah this just makes me wanna see real world numbers on the slowdown, cuz honestly all these microcode fixes feel like trading off years of speed for maybe a little more peace of mind - you ever think well actually move off this cycle or is it just here to stay?
评论 #43984173 未加载
whatever111 days ago
It’s dead, can you please stop stubbing it?
评论 #43975670 未加载
arghwhat11 days ago
&gt; On an up to date Ubuntu 24.04<p>So not <i>very</i> up to date, but I suppose mitigations haven&#x27;t changed significantly upstream since then.
评论 #43975135 未加载
评论 #43975154 未加载
评论 #43975271 未加载
评论 #43975138 未加载
评论 #43975187 未加载