Deutsch   English   Français   Italiano  
<2024Jul25.124828@mips.complang.tuwien.ac.at>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: anton@mips.complang.tuwien.ac.at (Anton Ertl)
Newsgroups: comp.arch
Subject: Re: YASV (Yet Another Security Vulnearability)
Date: Thu, 25 Jul 2024 10:48:28 GMT
Organization: Institut fuer Computersprachen, Technische Universitaet Wien
Lines: 23
Message-ID: <2024Jul25.124828@mips.complang.tuwien.ac.at>
References: <v7rqbf$1ta84$1@dont-email.me>
Injection-Date: Thu, 25 Jul 2024 12:58:57 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="727fe2cbfbc5aa2330e92c1788433fc3";
	logging-data="2378429"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX18TNY4AyS87c8s6D5loT2JK"
Cancel-Lock: sha1:brs8m9iTtZCNdfnc5c39IoIdoTQ=
X-newsreader: xrn 10.11
Bytes: 1891

Thomas Koenig <tkoenig@netcologne.de> writes:
>This time, it's "Indirector".
>
>https://thehackernews.com/2024/07/new-intel-cpu-vulnerability-indirector.html

This article is devoid of any useful information, except that if one
looks closely, one finds a link to the page by the authors of the
work:

https://indirector.cpusec.org/

My understanding is that it actually is not a new vulnerability, but
instead more work on Spectre v2: They reverse engineered how indirect
branch predictors and BTBs work in current Intel processors.  In the
page, they write that they used this knowledge "to breach security
boundaries across diverse scenarios".  OTOH, Intel claims that "no new
mitigations or guidance is required"
<https://www.intel.com/content/www/us/en/security-center/announcement/intel-security-announcement-2024-07-02-001.html>.

- anton
-- 
'Anyone trying for "industrial quality" ISA should avoid undefined behavior.'
  Mitch Alsup, <c17fcd89-f024-40e7-a594-88a85ac10d20o@googlegroups.com>