[ / / / / / / / / / / / / / ] [ dir / arepa / asmr / had / hwndu / leftpol / sw / vg / zoo ][Options][ watchlist ]

/tech/ - Technology

You can now write text to your AI-generated image at https://aiproto.com It is currently free to use for Proto members.
Name
Email
Subject
Comment *
File
Select/drop/paste files here
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

[–]

 No.918091>>918196 >>918201 >>918246 >>918374 [Watch Thread][Show All Posts]

https://access.redhat.com/security/vulnerabilities/ssbd

>Red Hat has been made aware of a vulnerability that exists in modern microprocessors, requiring updates to the Linux kernel, virtualization-related components, and a microcode update.

>An unprivileged attacker can use this flaw to bypass restrictions in order to gain read access to privileged memory that would otherwise be inaccessible.

>This issue is known to affect CPUs of various microarchitectures from: AMD, ARM, IBM POWER8, POWER9, and SystemZ series, and Intel processors.

 No.918093

The bug itself being discussed here

https://bugs.chromium.org/p/project-zero/issues/detail?id=1528

>I noticed that Intel's Optimization Manual says in section 2.4.4.5 ("Memory Disambiguation"):

> - A load instruction micro-op may depend on a preceding store. Many microarchitectures block loads until all preceding store address

are known.

> - The memory disambiguator predicts which loads will not depend on any previous stores. When the disambiguator predicts that a load does not have such a dependency, the load takes its data from the L1 data cache.

> - Eventually, the prediction is verified. If an actual conflict is detected, the load and all succeeding instructions are re-executed.

>According to my experiments, this effect can be used to cause speculative execution to continue far enough to execute a Spectre-style gadget on a pointer read from a memory slot to which a store has been speculatively ignored. I have tested this behavior on the following processors from Intel and AMD:

> - Intel(R) Core(TM) i7-6600U CPU @ 2.60GHz [Skylake laptop]

> - AMD PRO A8-9600 R7, 10 COMPUTE CORES 4C+6G [AMD desktop]

> - Intel(R) Xeon(R) CPU E5-1650 v3 @ 3.50GHz [Haswell desktop]

> I haven't yet tested this on any ARM CPU.

>Interestingly, only on the Skylake laptop, it seems to work when interrupts and SMP are disabled while the test is running; on the other machines, it seems to only work when interrupts are enabled, maybe because the kernel code cause some noise that garbles some predictor state or so? Or just because they mess up timing somewhere...


 No.918196

>>918091 (OP)

Since OP is obviously a faggot and can't even write a proper writeup:

>CVE-2018-3640 -- Rogue System Register Read (RSRE) – also known as Variant 3a

>Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis.

>CVE-2018-3639 -- Speculative Store Bypass (SSB) – also known as Variant 4

>Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

https://www.redhat.com/en/blog/speculative-store-bypass-explained-what-it-how-it-works

https://blogs.technet.microsoft.com/srd/2018/05/21/analysis-and-mitigation-of-speculative-store-bypass-cve-2018-3639/

Intel's response:

http://www.youtube.com/watch?v=HHgxOXEQaFU


 No.918201>>918915

>>918091 (OP)

Just use TempleOS, bro. It is only OS that was not affected by those spectre/meltdown vulnerabilities.


 No.918210>>918212

File (hide): 727abcf1d63ab36⋯.gif (1023.97 KB, 500x354, 250:177, BurningDepression.gif) (h) (u)

File (hide): 7a66b748c02ec78⋯.jpg (2.22 MB, 2807x1908, 2807:1908, Atari_1040STf.jpg) (h) (u)

>30 year old gayman consoles and floppy based home computers have greater hardware security than CY+3 IBM Compatibles


 No.918212>>918229

>>918210

If the M86k and 65xx series continued its not unreasonable to assume they would also be effected by these same bugs


 No.918229>>918313

>>918212

I don't know if those chips are still used, but Z80 is and it doesn't have all these problems.

https://en.wikipedia.org/wiki/Zilog_eZ80


 No.918246>>918319 >>918472

>>918091 (OP)

>This issue is known to affect POWER9

Boy, I sure am glad I spent $4k on a secure (((Talos))) workstation


 No.918255

Does this affect Xburst MIPS shit like the MIPS Creator? I'm assuming not as I've never heard of MIPS anything with out of order execution.


 No.918313>>918453 >>918463

>>918229

Do they even have virtual memory? Can Linux be used on them? Why don't we have 68k distros then?


 No.918318

File (hide): a1f0227e2605165⋯.jpeg (71.23 KB, 1024x629, 1024:629, intelceo.jpeg) (h) (u)


 No.918319

>>918246

POWER9 isn't open at all. the spec's are behind a $100,000/year paywall and NDA.


 No.918374>>918470

>>918091 (OP)

Fuck.

These vulnerabilities are just going to keep piling up, aren't they? I can't wait until all the necessaty security and firmware patches reduce the performance of some $100,000 Xeon to the level of an Intel 4004.


 No.918453>>918541

File (hide): 5419af5bf44ee9a⋯.jpg (208.19 KB, 847x1105, 847:1105, pub-amiga3000ux-svr4.jpg) (h) (u)

>>918313

Not the Z80, it's a simple 8-bit CPU. Very good for embedded stuff, and nice for simple computers and game consoles.

But m68k can and did run Unix. That chip was even used in NeXT and Sun workstations, and also pic. There used to be Linux and BSD ports for m68k-based computers. NetBSD might even still work on them.


 No.918463

>>918313

It can run CP/M, which is open source too nowadays.

Considering how the "fixes" for all these vulnerabilities involve performance hits, it might be a good idea to start getting used to it again.


 No.918470>>918541

>>918374

The beauty of tomorrow is that security is nonexistent and worms will no longer be made of just one exploit but dozen all cooperating.

A beautiful dystopia where nobody can hide any information and only truth can be found easily.

I jerked off when I heard of those guys that found real name of Satoshi Nakamoto


 No.918472

>>918246

Boy I'm glad I don't shill (((Intel))) 4free


 No.918541

>>918453

>NetBSD might even still work on them.

NetBSD has a working and up to date Dreamcast port, of course it's probably still got one for a general purpose machine.

>>918470

All the more reason to go full tinfoil.


 No.918543>>927709

Say what you want about the SJW RPi, but it's immune to all of the current and future Spectre and Meltdown vulnerabilites.

The RPi is also way faster than some old Intel 386 collecting dust in a basement.


 No.918915>>927742

>>918201

it's in the hardware you dinghole


 No.927709

>>918543

With VideoCore being publicly undocumented, you can't be sure.


 No.927742

>>918915

>no networking


 No.927766

File (hide): c0eaf859c636130⋯.png (121.08 KB, 500x347, 500:347, 1514178164712.png) (h) (u)

A new hardware vulnerability is found every day, i don't give a fuck anymore.


 No.927768

File (hide): 66e19a69d09fcf6⋯.png (543.47 KB, 986x1278, 493:639, signs2.png) (h) (u)

intel-pkg update

intel-pkg upgrade




[Return][Go to top][Catalog][Screencap][Nerve Center][Cancer][Update] ( Scroll to new posts) ( Auto) 5
23 replies | 6 images | Page ???
[Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / arepa / asmr / had / hwndu / leftpol / sw / vg / zoo ][ watchlist ]