Intel, AMD CPUs on Linux impacted by newly disclosed Spectre bypass
Recent research shows Intel and AMD CPUs on Linux are vulnerable to speculative execution attacks bypassing Spectre mitigations, affecting multiple processor generations. Intel released a microcode fix; AMD calls it a software bug.
Read original articleRecent research has revealed that certain Intel and AMD CPUs running on Linux are vulnerable to new speculative execution attacks that can bypass existing Spectre mitigations. The affected Intel processors include the 12th, 13th, and 14th generations, as well as the 5th and 6th generation Xeon chips. AMD's older Zen 1, Zen 1+, and Zen 2 architectures are also impacted. These vulnerabilities exploit weaknesses in the Indirect Branch Predictor Barrier (IBPB), a key defense mechanism against speculative execution attacks. Researchers from ETH Zurich demonstrated that these attacks can leak sensitive information, such as root passwords, by manipulating speculative execution processes. Both Intel and AMD were informed of these vulnerabilities in June 2024, with Intel acknowledging the issue and assigning it a CVE identifier. Although Intel has released a microcode fix, it has not been widely implemented across all operating systems. AMD has also confirmed the vulnerability but classified it as a software bug rather than a hardware flaw. The ETH Zurich team is collaborating with Linux kernel maintainers to develop a patch for the affected AMD processors.
- Intel and AMD CPUs on Linux are vulnerable to new Spectre bypass attacks.
- The vulnerabilities affect multiple generations of Intel and AMD processors.
- The attacks exploit weaknesses in the Indirect Branch Predictor Barrier (IBPB).
- Intel has released a microcode fix, but it is not yet widely available.
- AMD classifies the issue as a software bug and has not issued a microcode fix.
Related
Vulnerability in Popular PC and Server Firmware
Eclypsium found a critical vulnerability (CVE-2024-0762) in Intel Core processors' Phoenix SecureCore UEFI firmware, potentially enabling privilege escalation and persistent attacks. Lenovo issued BIOS updates, emphasizing the significance of supply chain security.
SinkClose flaw impacts AMD EPYC and Ryzen CPUs, helps gain Ring -2 privileges
AMD's SinkClose vulnerability affects EPYC, Ryzen, and Threadripper processors, allowing privilege escalation to Ring -2. Detected after nearly 20 years, mitigations are available, but risks remain from advanced attackers.
Researchers discover potentially catastrophic exploit present in AMD chips
Researchers have found a serious vulnerability in AMD processors, affecting chips since 2006, allowing deep firmware access. AMD is developing patches, with risks primarily for corporations and government entities.
Almost unfixable "Sinkclose" bug affects AMD chips
Researchers discovered a major security vulnerability in AMD processors, named "Sinkclose," affecting millions of chips since 2006, allowing undetectable malware installation and posing severe risks to system security.
AMD's processors have been shipping with a dangerous security bug
AMD's "Sinkclose" bug affects processors since 2006, allowing undetectable malware execution. Users may need to dispose of infected systems. AMD issued a security bulletin and is developing mitigation strategies.
Related
Vulnerability in Popular PC and Server Firmware
Eclypsium found a critical vulnerability (CVE-2024-0762) in Intel Core processors' Phoenix SecureCore UEFI firmware, potentially enabling privilege escalation and persistent attacks. Lenovo issued BIOS updates, emphasizing the significance of supply chain security.
SinkClose flaw impacts AMD EPYC and Ryzen CPUs, helps gain Ring -2 privileges
AMD's SinkClose vulnerability affects EPYC, Ryzen, and Threadripper processors, allowing privilege escalation to Ring -2. Detected after nearly 20 years, mitigations are available, but risks remain from advanced attackers.
Researchers discover potentially catastrophic exploit present in AMD chips
Researchers have found a serious vulnerability in AMD processors, affecting chips since 2006, allowing deep firmware access. AMD is developing patches, with risks primarily for corporations and government entities.
Almost unfixable "Sinkclose" bug affects AMD chips
Researchers discovered a major security vulnerability in AMD processors, named "Sinkclose," affecting millions of chips since 2006, allowing undetectable malware installation and posing severe risks to system security.
AMD's processors have been shipping with a dangerous security bug
AMD's "Sinkclose" bug affects processors since 2006, allowing undetectable malware execution. Users may need to dispose of infected systems. AMD issued a security bulletin and is developing mitigation strategies.