Re: Uh Oh - NEW Data Leak Found in Intel Processors

Liste des GroupesRevenir à col misc 
Sujet : Re: Uh Oh - NEW Data Leak Found in Intel Processors
De : tnp (at) *nospam* invalid.invalid (The Natural Philosopher)
Groupes : comp.os.linux.misc
Date : 24. May 2025, 11:33:34
Autres entêtes
Organisation : A little, after lunch
Message-ID : <100s79v$las6$3@dont-email.me>
References : 1 2 3 4 5
User-Agent : Mozilla Thunderbird
On 24/05/2025 11:08, Richard Kettlewell wrote:
c186282 <c186282@nnada.net> writes:
On 5/22/25 4:16 PM, Richard Kettlewell wrote:
I don’t think that’s correct. The BPRC attack breaches user/kernel,
guest/host and application-internal boundaries (i.e. it undermines
IBPB). Much wider impact than cloud service providers.
https://comsec.ethz.ch/wp-content/files/bprc_sec25.pdf
is the full paper.
>
   Theoretically true. In PRACTICE however, it's a kinda
   difficult breech technique - so expect it to be almost
   entirely confined to "big"/"important" targets.
 Read the paper. The user/kernel version of the exploit is not
theoretical; they built it. The data leakage rate quoted is based on
measurement, not analysis.
 
   "Home", "smaller biz", nope.
 That’s rather naive. Domestic users are absolutely a target. For example
when building a botnet the ownership of the endpoints is totally
irrelevant - it’s all about quantity, not quality.
 
Ah. Do you think this is the easiest way to build a botnet?
My impression is that the technical lack of sophistication of most ratware apps is only exceeded by the complete disregard of basic security on internet connected hosts.
How many bots knocking on my doors trying to ssh in as 'root' Or login to a pop or SMTP server using 'user@domain' identities?

   STILL needs to be fixed ... but can EXISTING
   chips be fixed without trashing performance ?
 Read the paper, they quote the performance cost of mitigations.
 
Its technically a very interesting flaw. How serious in real life is unknown.
--
Truth welcomes investigation because truth knows investigation will lead to converts. It is deception that uses all the other techniques.

Date Sujet#  Auteur
22 May08:38 * Re: Uh Oh - NEW Data Leak Found in Intel Processors6Marc Haber
22 May21:16 `* Re: Uh Oh - NEW Data Leak Found in Intel Processors5Richard Kettlewell
24 May06:46  `* Re: Uh Oh - NEW Data Leak Found in Intel Processors4c186282
24 May11:08   `* Re: Uh Oh - NEW Data Leak Found in Intel Processors3Richard Kettlewell
24 May11:33    `* Re: Uh Oh - NEW Data Leak Found in Intel Processors2The Natural Philosopher
24 May19:11     `- Re: Uh Oh - NEW Data Leak Found in Intel Processors1Richard Kettlewell

Haut de la page

Les messages affichés proviennent d'usenet.

NewsPortal