ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Eight new Spectre Variant Vulnerabilities for Intel Discovered - four of them critical

    IT Discussion
    spectre meltdown intel amd
    5
    7
    1.3k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • IRJI
      IRJ
      last edited by

      https://www.guru3d.com/news-story/eight-new-spectre-variant-vulnerabilities-for-intel-discovered-four-of-them-critical.html

      uh oh

      1 Reply Last reply Reply Quote 3
      • scottalanmillerS
        scottalanmiller
        last edited by

        Ouch

        1 Reply Last reply Reply Quote 0
        • dafyreD
          dafyre
          last edited by

          This is why we haven't been making the mad dash to patch all of these issues yet. Once they get settled without the patches breaking everything, then we'll start patching.

          1 Reply Last reply Reply Quote 1
          • KellyK
            Kelly
            last edited by

            The image on the article in hilarious.

            1 Reply Last reply Reply Quote 2
            • ObsolesceO
              Obsolesce
              last edited by

              Wow....

              But how practical is it to not only first exploit the Spectre vulnerability, but then to get any useful data from most likely other unknown shared VMs on the same box? (really, only on a shared hosting provider host is where 99.9% of the threat is)

              This stuff is discarded speculative cached data... maybe a thumbnail you won't be viewing (if it goes that big), or maybe a few bits leading in that direction... maybe credentials (that are encrypted anyways)...

              It seems like all you can do is "fish" for unknown discarded speculative data... it doesn't really sound like a huge practical threat, however, I do see the severity and horrible potential of it, just not the practicality.

              KellyK 1 Reply Last reply Reply Quote 0
              • KellyK
                Kelly @Obsolesce
                last edited by

                @tim_g said in Eight new Spectre Variant Vulnerabilities for Intel Discovered - four of them critical:

                Wow....

                But how practical is it to not only first exploit the Spectre vulnerability, but then to get any useful data from most likely other unknown shared VMs on the same box? (really, only on a shared hosting provider host is where 99.9% of the threat is)

                This stuff is discarded speculative cached data... maybe a thumbnail you won't be viewing (if it goes that big), or maybe a few bits leading in that direction... maybe credentials (that are encrypted anyways)...

                It seems like all you can do is "fish" for unknown discarded speculative data... it doesn't really sound like a huge practical threat, however, I do see the severity and horrible potential of it, just not the practicality.

                Here is how I see it playing out in the larger world. Bad actors will be spinning up VMs on hosting providers' hardware, and then trolling for data of cohosted VMs. It isn't a large problem in a secure environment where the list of people who can spin up VMs also have the credentials necessary to make a Spectre-ng attack a waste of time and energy.

                scottalanmillerS 1 Reply Last reply Reply Quote 3
                • scottalanmillerS
                  scottalanmiller @Kelly
                  last edited by

                  @kelly said in Eight new Spectre Variant Vulnerabilities for Intel Discovered - four of them critical:

                  @tim_g said in Eight new Spectre Variant Vulnerabilities for Intel Discovered - four of them critical:

                  Wow....

                  But how practical is it to not only first exploit the Spectre vulnerability, but then to get any useful data from most likely other unknown shared VMs on the same box? (really, only on a shared hosting provider host is where 99.9% of the threat is)

                  This stuff is discarded speculative cached data... maybe a thumbnail you won't be viewing (if it goes that big), or maybe a few bits leading in that direction... maybe credentials (that are encrypted anyways)...

                  It seems like all you can do is "fish" for unknown discarded speculative data... it doesn't really sound like a huge practical threat, however, I do see the severity and horrible potential of it, just not the practicality.

                  Here is how I see it playing out in the larger world. Bad actors will be spinning up VMs on hosting providers' hardware, and then trolling for data of cohosted VMs. It isn't a large problem in a secure environment where the list of people who can spin up VMs also have the credentials necessary to make a Spectre-ng attack a waste of time and energy.

                  Also worth noting, in a cloud environment the data that can be caught this way is essentially random and ephemeral. What works today won't work tomorrow, and whose data you are getting is normally unknown. The scale and anonymity of cloud computing makes these attacks more possible, but less effective, almost to the point of useless.

                  1 Reply Last reply Reply Quote 1
                  • 1 / 1
                  • First post
                    Last post