All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
[AMD vuln] New AMD Side Channel Attacks Discovered, Impacts Zen Architecture
Seeing all the Intel Vuln Topics, they (Graz University) also now found a Vuln for AMD processors which also affects Ryzen and Epyc aswell.
We reverse-engineered AMD’s L1D cache way predictor in microarchitectures from 2011 to 2019, resulting in two new attack techniques. With Collide+Probe, an attacker can monitor a victim’s memory accesses without knowledge of physical addresses or shared memory when time-sharing a logical core. With Load+ Reload, we exploit the way predictor to obtain highly-accurate memory-access traces of victims on the same physical core. While Load+Reload relies on shared memory, it does not invalidate the cache line, allowing stealthier attacks that do not induce any last level-cache evictions."
Comments
)
not a huge deal, at least it's not 20 different ones.
Deals please Max. Thank you in advance!
https://www.amd.com/en/corporate/product-security
It seems the only way to abuse it is if you've disabled the spectre patches of yore.
FIX - a word
Francisco
Wonder who would do that.
Especially on AMD. The mitigations shaved off a couple % total. It's a rounding error in benchmarks.
Francisco
Some for @seriesn to start marketing ARM VPS I guess. “Shocked from the news? Ryzen above with ARM 1+1= 3 cores”
Selling snapdragon VPS's from my tablet. 3+3=9 Core promo!
I'd get that 😂
This research was also funded by Intel, so let's wait a bit if it's actually even real
Intel and AMD funding researchers to find each other's vulnerabilities. Starving grad students can finally hoard more packs of Ramen. Interesting times ahead.
Possible plot twist: ARM becomes extremely vulnerable - datacenters based on Raspberry PI get worried - OpenWRT working to create a software fix.