Don't want to see articles from a certain category? When logged in, go to your User Settings and adjust your feed in the Content Preferences section where you can block tags!
We do often include affiliate links to earn us some pennies. See more here.

Spectre is one in a list of critical vulnerabilities in modern processors that was discovered over the last few years, and it seems it's not been solved yet. Despite new hardware designs, and updates to the Linux Kernel and more to defend against the issues, researchers at University of Virginia School of Engineering claim to have a new discovery that could have a huge impact.

Affecting both AMD and Intel, in a post titled "Defenseless", UVA Engineering say we will "have to go back to the drawing board" when it comes to defending against it as they've "uncovered a line of attack that breaks all Spectre defenses, meaning that billions of computers and other devices across the globe are just as vulnerable today as they were when Spectre was first announced".

What they're doing is exploiting a "micro-op cache" that "speeds up computing by storing simple commands and allowing the processor to fetch them quickly and early in the speculative execution process". What they found is that they can pinch data from it when a processor tries fetching from this cache. Current defenses for Spectre deal with what happens later on for speculative execution and so they don't help here.

Their team disclosed the vulnerabilities to AMD and Intel already, and they gave a tech talk at Intel Labs worldwide April 27, to talk about potential fixes.

See the announcement and the paper for more info.

Article taken from GamingOnLinux.com.
15 Likes
About the author -
author picture
I am the owner of GamingOnLinux. After discovering Linux back in the days of Mandrake in 2003, I constantly checked on the progress of Linux until Ubuntu appeared on the scene and it helped me to really love it. You can reach me easily by emailing GamingOnLinux directly.
See more from me
The comments on this article are closed.
7 comments

BielFPs May 1, 2021
I hope we don't get more performance regression due to the mitigation about this one
kellerkindt May 1, 2021
View PC info
  • Supporter Plus
Quoting: BielFPsI hope we don't get more performance regression due to the mitigation about this one

well...

Quote“In the case of the previous Spectre attacks, developers have come up with a relatively easy way to prevent any sort of attack without a major performance penalty” for computing, Moody said. “The difference with this attack is you take a much greater performance penalty than those previous attacks.”
BielFPs May 1, 2021
Quoting: kellerkindtwell...
We seriously need a replacement for silicon as soon as possible.
HalfBaked May 1, 2021
Is this the same micro-op cache that's used to cache the simpler risc-like instructions that the x86 instructions are translated to? If this is the case it shouldn't affect arm or power chips.
whatever May 2, 2021
Quoting: HalfBakedIs this the same micro-op cache that's used to cache the simpler risc-like instructions that the x86 instructions are translated to? If this is the case it shouldn't affect arm or power chips.

ARM's microarchitectures use Mop caches as well.
It's a widely used mechanism for fast instruction decoding.
This doesn't mean this or similar vulnerability is present in ARM's uarchs tho.
Intel and AMD really must stop the bike.
Instead of wasting resources in the release "new" processors every six months, they should be working on a new bugfree architecture.
BielFPs May 3, 2021
Quoting: Guestgraphene: https://en.wikipedia.org/wiki/Graphene
Graphene are the stem cells of technology, in theory it's revolutionary for a lot of things, except leaving the research lab.
While you're here, please consider supporting GamingOnLinux on:

Reward Tiers: Patreon. Plain Donations: PayPal.

This ensures all of our main content remains totally free for everyone! Patreon supporters can also remove all adverts and sponsors! Supporting us helps bring good, fresh content. Without your continued support, we simply could not continue!

You can find even more ways to support us on this dedicated page any time. If you already are, thank you!
The comments on this article are closed.