EVGA

Yet Another Speculative Malfunction: Intel Reveals New Side-Channel Attack

Author
GTXJackBauer
Omnipotent Enthusiast
  • Total Posts : 10323
  • Reward points : 0
  • Joined: 2010/04/19 22:23:25
  • Location: (EVGA Discount) Associate Code : LMD3DNZM9LGK8GJ
  • Status: offline
  • Ribbons : 48
2019/05/14 12:33:39 (permalink)
Yet Another Speculative Malfunction: Intel Reveals New Side-Channel Attack, Advises Disabling Hyper-Threading Below 8th, 9th Gen CPUs

Ouch doesn't even begin to describe how much that headline hurt. As far as speculatrive execution goes, it's been well covered by now, but here's a refresher. Speculative execution essentially means that your CPU tries to think ahead of time on what data may or may not be needed, and processes it before it knows it's needed. The objective is to take advantage of concurrency in the CPU design, keeping processing units that owuld otherwise be left idle to process and deliver results on the off-chance that they are indeed required by the system: and when they are called for, the CPU saves time by not having to process them on the fly and already having them available.

The flaws have been announced by intel in coordination with Austrian university TU Graz, Vrije Universiteit Amsterdam, the University of Michigan, the University of Adelaide, KU Leuven in Belgium, Worcester Polytechnic Institute, Saarland University in Germany and security firms Cyberus, BitDefender, Qihoo360 and Oracle. While some of the aprts involved have named the four identified flaws with names such as "ZombieLoad", "Fallout", and RIDL, or "Rogue In-Flight Data Load", Intel is taking the PEGI-13 Microarchitectural Data Sampling (MDS) name.
 


The issue at hand here, defined by Intel's pretty tame MDS, is that like other side-channel attacks, exploits may allow hackers to obtain information that was otherwise deemed secure, had it not been run through the CPU's speculative execution processes. While Meltdown read sensitive information that was being stored in memory due to the speculative execution functions on Intel's CPUs, MDS attacks read the data on the CPU's various buffers - between threads, along the way to the CPU's cache, and others. The researchers say that this flaw can be used to siphon data from the CPU at a rate that can approach real-time, and can be used to selectively pull what information is deemed important: whether passwords or what websites the user is visiting at the moment of the attack, it's all fair game.
 


Intel says that significant software changes will be needed to harden systems against this exploit, not only from themselves, but from operating system designers and third party app creators. One of the proposed solutions is that every time a processor would switch from one third-party app to another, from a Windows process to a third-party app, or even from less trusted Windows processes to more trusted ones, the buffers have to be cleared or overwritten. This means a whole new cycle of data gathering and writing every time you call up a different process - and you bet that carries a performance penalty, which Intel is putting at a "minimal" up to 9%.

Intel in its white paper detailing the vulnerability admitted that disbaling HT might be warranted as a protection against MDS attacks - and you can imagine how much the company must have loathed to publish such a thing. Intel's HT has been heavily hit by the repeated speculative executon flaws found on Intel processors, with mititgations usually costing some sort of performance on Intel's concurrent processing technology. Intel says its engineers discovered the MDS vulnerabilities last year, and that it has now released fixes for the flaw in both hardware and software. Although obvisously, the software fixes will have to be deployed either on microcode updates or will have to be implemented by every operating system, virtualization vendor, and other software makers.

Intel also said that its 8th and 9th generation processors already include the hardware mitigations that defeat the exploitaition of MDS, but previous architectures back to Nehalem are vulnerable. But why play it on expectations: you can take a test that has been published by the researchers right here.

The CVE codes for the vulnerabilities stand as such:

    CVE-2018-12126 Microarchitectural Store Buffer Data Sampling (MSBDS)
    CVE-2018-12130 Microarchitectural Fill Buffer Data Sampling (MFBDS)
    CVE-2018-12127 Microarchitectural Load Port Data Sampling (MLPDS)
    CVE-2019-11091 Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
 

 
Source
 

 

 
This better be fixed with the next round of hardware or they'll take a nice hit in sales me thinks.
post edited by GTXJackBauer - 2019/05/15 15:39:32

 Use this Associate Code at your checkouts or follow these instructions for Up to 10% OFF on all your EVGA purchases:
LMD3DNZM9LGK8GJ
#1

7 Replies Related Threads

    Nereus
    Captain Goodvibes
    • Total Posts : 18926
    • Reward points : 0
    • Joined: 2009/04/09 20:05:53
    • Location: Brooklyn, NYC.
    • Status: offline
    • Ribbons : 58
    Re: Yet Another Speculative Malfunction: Intel Reveals New Side-Channel Attack 2019/05/14 14:17:08 (permalink)
     
    FFS... that's even chips as recent as the i7-7700k. Fix is to turn off HT? Really? ..or is this a cunning plan to push people into new mega-core non-HT chips...
     


      BUILD 1 2   |   MINI-ITX BUILD   |   MODSRIGS $1K WIN   |   HEATWARE 111-0-0   |   ASSOCIATE CODE CSKKXUT5Q9GVAFR

    #2
    Sajin
    EVGA Forum Moderator
    • Total Posts : 49168
    • Reward points : 0
    • Joined: 2010/06/07 21:11:51
    • Location: Texas, USA.
    • Status: offline
    • Ribbons : 199
    Re: Yet Another Speculative Malfunction: Intel Reveals New Side-Channel Attack 2019/05/14 14:19:40 (permalink)

    #3
    rjohnson11
    EVGA Forum Moderator
    • Total Posts : 102313
    • Reward points : 0
    • Joined: 2004/10/05 12:44:35
    • Location: Netherlands
    • Status: offline
    • Ribbons : 84
    Re: Yet Another Speculative Malfunction: Intel Reveals New Side-Channel Attack 2019/05/14 22:43:30 (permalink)
    Poor Intel. They really are taking a lot of security issues lately. 

    AMD Ryzen 9 7950X,  Corsair Mp700 Pro M.2, 64GB Corsair Dominator Titanium DDR5  X670E Steel Legend, MSI RTX 4090 Associate Code: H5U80QBH6BH0AXF. I am NOT an employee of EVGA

    #4
    bdary
    Omnipotent Enthusiast
    • Total Posts : 10337
    • Reward points : 0
    • Joined: 2008/04/25 14:08:16
    • Location: Florida
    • Status: offline
    • Ribbons : 116
    Re: Yet Another Speculative Malfunction: Intel Reveals New Side-Channel Attack 2019/05/15 06:48:18 (permalink)
    One security issue after the other...


     
     
     
     
     
     
     
     
     
    #5
    rjohnson11
    EVGA Forum Moderator
    • Total Posts : 102313
    • Reward points : 0
    • Joined: 2004/10/05 12:44:35
    • Location: Netherlands
    • Status: offline
    • Ribbons : 84
    Re: Yet Another Speculative Malfunction: Intel Reveals New Side-Channel Attack 2019/05/15 06:52:38 (permalink)
    I guess it will take another year until Intel manages to make their processors more security efficient

    AMD Ryzen 9 7950X,  Corsair Mp700 Pro M.2, 64GB Corsair Dominator Titanium DDR5  X670E Steel Legend, MSI RTX 4090 Associate Code: H5U80QBH6BH0AXF. I am NOT an employee of EVGA

    #6
    Davabled
    FTW Member
    • Total Posts : 1755
    • Reward points : 0
    • Joined: 2003/10/09 00:50:04
    • Location: Michigan
    • Status: offline
    • Ribbons : 44
    Re: Yet Another Speculative Malfunction: Intel Reveals New Side-Channel Attack 2019/05/15 11:45:53 (permalink)
    And now starts my confusion.... are the 9th gen Coffee-Lake refresh CPUs more vulnerable, or less vulnerable?
     
    The article the OP posted states that
    8th & 9th generation processors already include the hardware mitigations that defeat the exploitation of MDS
     
    But, this Trend Micro article https://www.trendmicro.com/vinfo/ru/security/news/vulnerabilities-and-exploits/side-channel-attacks-ridl-fallout-and-zombieload-affects-millions-of-vulnerable-intel-processors states:
    The researchers noted that the measures placed in the latest i9 CPUs (Coffee Lake Refresh) to mitigate Meltdown make them more susceptible to Fallout.
     
    #7
    Cool GTX
    EVGA Forum Moderator
    • Total Posts : 31004
    • Reward points : 0
    • Joined: 2010/12/12 14:22:25
    • Location: Folding for the Greater Good
    • Status: offline
    • Ribbons : 122
    Re: Yet Another Speculative Malfunction: Intel Reveals New Side-Channel Attack 2019/05/16 09:39:16 (permalink)
    best to Test ones system to determine the vulnerability (s)  that are present
     
    & keep your Security Software & Both physical & software firewalls up to date

    Learn your way around the EVGA Forums, Rules & limits on new accounts Ultimate Self-Starter Thread For New Members

    I am a Volunteer Moderator - not an EVGA employee

    https://foldingathome.org -->become a citizen scientist and contribute your compute power to help fight global health threats

    RTX Project EVGA X99 FTWK Nibbler EVGA X99 Classified EVGA 3080Ti FTW3 Ultra


    #8
    Jump to:
  • Back to Mobile