新的幽靈漏洞昨天被發佈 - 3C

Table of Contents

新聞來源:
https://www.tomshardware.com/news/intel-alder-lake-arm-cpus-affected-by-new-spec
tre-vulnerability

縮網址:https://bit.ly/3hOskDS

新的幽靈漏洞昨天被發佈,
這個屬於Specture-V2的漏洞,主要影響Intel跟Arm CPU系統,
Intel從Haswell開始到Alderlake都有影響,
會出一個新的軟體更新去修正這問題,

Arms則是影響Cortex A15, A57, A72 及 Neoverse V1, N1, and N2

可由Intel之 CVE-2022-0001、CVE-2022-0002
及 Arm 之 CVE-2022-23960 了解漏洞及修正

漏洞演示:
https://twitter.com/vu5ec/status/1501256481097883648

https://youtu.be/537HUwV36ME


底下為原文:
VUSec security research group and Intel on Tuesday disclosed a yet another Spect
re-class speculative execution vulnerability called branch history injection (BH
I). The new exploit affects all of Intel processors released in the recent years
, including the latest Alder Lake CPUs, and select Arm cores. By contrast, AMD's
chips are believed to be unaffected.

BHI is a proof-of-concept attack that affects CPUs already vulnerable to Spectre
V2 exploits, but with all kinds of mitigations already in place. The new exploi
t bypasses Intel's eIBRS and Arm's CSV2 mitigations, reports Phoronix. BHI re-en
ables cross-privilege Spectre-v2 exploits, allows kernel-to-kernel (so-called in
tra-mode BTI) exploits, and allows perpetrators to inject predictor entries into
the global branch prediction history to make kernel leak data, reports VUSec. A
s a result, arbitrary kernel memory on select CPUs can be leaked and potentially
reveal confidential information, including passwords. An example of how such a
leak can happen was published here.

VUSec
圖片我就不附上,因為有影片
(Image credit: VUSec)
All of Intel's processors beginning with Haswell (launched in 2013) and extendin
g to the latest Ice Lake-SP and Alder Lake are affected by the vulnerability, bu
t Intel is about to release a software patch that will mitigate the issue.

Numerous cores from Arm, including Cortex A15, A57, A72 as well as Neoverse V1,
N1, and N2 are also affected. Arm is expected to release software mitigations f
or its cores. What is unclear is whether custom versions of these cores (e.g., s
elect cores from Qualcomm) are also affected and when the potential security hol
es will be covered.

Since this is a proof-of-concept vulnerability and it is being mitigated by Inte
l and Arm, it should not be able to be used to attack a client or server machine
— as long as all the latest patches are installed. There's no indication how m
uch the mitigations will impact performance.

----------
https://i.imgur.com/RVYbywG.jpg

----
Sent from BePTT on my SHARP FS8002

--

All Comments

Regina avatarRegina2022-03-09
是AMD運氣好嗎?常常都沒他的事
Lucy avatarLucy2022-03-09
架構不同,分支預測做法不同
Ida avatarIda2022-03-09
不會說都沒有,但是會比較少
Joe avatarJoe2022-03-09
https://bit.ly/3hOWZRF
其實沒有比較少,只是沒人無聊一直
Joseph avatarJoseph2022-03-10
貼。這一個還算蠻有趣的
Mia avatarMia2022-03-10
AMD自己bug就夠搞了
Ursula avatarUrsula2022-03-10
Designer: 又要多浪費電晶體了
Connor avatarConnor2022-03-10
一直都有,看大不大條和好不好修而
已,以前的漏洞是修完-50%效能才被
Ida avatarIda2022-03-10
AMD被炮是因為效能原本就沒有intel
Hazel avatarHazel2022-03-10
好 修完BUG例如當年TLB BUG效能
又更少
Puput avatarPuput2022-03-10
安全漏洞無感吧 用AMD的很少
的人
Rachel avatarRachel2022-03-10
i皇「跟上!! AMD快跟上!!」
Iris avatarIris2022-03-10
I皇就靠漏洞偷效能
Agatha avatarAgatha2022-03-10
當年分支預測漏洞號稱修補後最多會
降20%效能,但是實測之後影響很小
不過這個一系列漏洞的確打亂了i社
Bennie avatarBennie2022-03-10
的處理器布局,黑暗的九代U大部分都
拿掉了HT,整個市場定位亂掉
Olivia avatarOlivia2022-03-10
九代可以說是最亂的一代
Zora avatarZora2022-03-10
打了補丁又要降幾%效能
Hardy avatarHardy2022-03-10
原來是宣稱喔?我還以為是真的 XD
Zora avatarZora2022-03-10
那時很多團隊都測試過了,是有影響
但是對於一般user的影響很小。分支
Harry avatarHarry2022-03-10
預測的漏洞影響最大的是server用戶
當時比較擔心的是ssh key會被這種小
Megan avatarMegan2022-03-10
刀掘牆滴水穿石的方式偷走。但以結
果而言,駭客寧願去選更有效率的方
Freda avatarFreda2022-03-10
Ingrid avatarIngrid2022-03-10
e3 1231 v3被吃很多校能幹
Joe avatarJoe2022-03-10
#1TD5NRWH (PC_Shopping)
之前九代 還更新了步進從硬體層面修
Candice avatarCandice2022-03-10
Xeon E5 那時候I/O影響比較大
Frederica avatarFrederica2022-03-10
12代分支預測已經改良過了
Suhail Hany avatarSuhail Hany2022-03-10
又有漏洞了喔...