• Jane
    link
    fedilink
    English
    332 years ago

    How come branch prediction seems so vulnerable to exploits? Both spectre and meltdown were also caused by branch prediction not working quite right.

    • JackbyDev
      link
      fedilink
      English
      112 years ago

      The more steps in the instruction pipeline the more ways there are for there to be an error where some result doesn’t get erased when undoing stuff from the wrong branch. It’s basically like telling someone to move into a new house and get settled then stopping them six hours in and trying to make sure you get all their stuff out.

    • @[email protected]
      link
      fedilink
      English
      152 years ago

      It wasn’t branch prediction alone, it was the cache combined with branch prediction. The problem is that even discarded outcomes fill the cache with data. Those older vulnerabilities also had the problem that the access permissions check was done after the branch prediction. It’s probably too expensive to do when it’s not even clear yet whether the branch is going to be taken (that’s just speculation on my part though).

      • @[email protected]
        link
        fedilink
        English
        112 years ago

        (that’s just speculation on my part though).

        I see what you did there, even if you didn’t :)

  • @[email protected]
    link
    fedilink
    English
    102 years ago

    Is there any information on the performance impact of the microcode fix or is it too early for that?

    • Dr. Dabbles
      link
      fedilink
      English
      22 years ago

      So far the word is the microcode fix causes negligible performance impact, but using the MSR fix causes 5-15% loss. In my own testing on EPYC hardware, microcode made no noticable difference to my workloads and benchmarks. Same as random noise in results.

    • lnxtx (xe/xem/xyr)
      link
      fedilink
      English
      22 years ago

      Which one?

      From Wikipedia:

      Google has reported that any Intel processor since 1995 with out-of-order execution is potentially vulnerable to the Meltdown vulnerability (this excludes Itanium and pre-2013 Intel Atom CPUs).

  • @[email protected]
    link
    fedilink
    English
    02 years ago

    Welp. Thankfully my current AMD desktop PC will be the last one I’ll be using in my whole lifetime – RISC-V 4va. :^)

  • @[email protected]
    link
    fedilink
    English
    42 years ago

    Updated amd64-microcode for EPYC processors appears available for several distributions which has mitigations available. I went ahead and proactively grabbed the microcode update from Debian unstable (not the best practice) and applied it without issue to my Bullseye/EPYC.

    This isn’t exactly condoned as it’s not officially a backport, but I’ll take my chances as this is pretty critical.

    Date of the updated microcode should be July 19th.

  • NaN
    link
    fedilink
    English
    242 years ago

    affects all Zen 2-based Ryzen, Threadripper, and EPYC CPUs

    I know they’re probably pretty common, all my stuff ended up being Zen 3. Here’s hoping they don’t find similar issues in later generations.

    • FishInABarrel
      link
      fedilink
      62 years ago

      I’ve got an older 3900X that’s Zen 2, but I’m otherwise clear, too.

      It’s kind of hard to figure out which Zen # a CPU falls under, so here’s the Wiki page listing all Zen 2 CPUs.

  • ferret
    link
    fedilink
    English
    712 years ago

    Nice to know that security researchers are giving AMD some love too. Ill be sure to turn the patch off on my 3600 once it rolls around (can’t be losing any frames for something silly like security)

    • LoafyLemon
      link
      fedilink
      462 years ago

      That’s a very bad idea.

      The bad news is that the exploit doesn’t require physical hardware access and can be triggered by loading JavaScript on a malicious website.

  • @[email protected]
    link
    fedilink
    English
    1252 years ago

    Linux has a merged mitigation so when the new kernel comes out Linux users will be safe

    • @[email protected]
      link
      fedilink
      English
      142 years ago

      when the new kernel comes out Linux users will be safe

      It’s going to take a lot longer than that for most distros to move to latest upstream. This specific fix might be pulled in as a hotfix if you’re lucky, but it still takes time. The latest Ubuntu LTS is on 5.15, for example, which was released in October 2021. Debian Bookworm, which just released last month, uses 6.1 from December 2022.

      • @[email protected]
        link
        fedilink
        English
        202 years ago

        This is exactly the kind of thing that gets backported to stable LTS distros tho. The kernel Major.Minor is just the base - it doesn’t tell the whole story.

        • @[email protected]
          link
          fedilink
          English
          42 years ago

          Right - I was just objecting to the suggestion that once upstream has the fix, “Linux users will be safe”.

      • @[email protected]
        link
        fedilink
        English
        192 years ago

        Critical security fixes are backported. There where a lot of kernels released yesterday that had the fix. For 5.15, 5.15.122 was released with the zenbleed mitigation.

        • @[email protected]
          link
          fedilink
          English
          62 years ago

          5.15.122 was released with the zen bleed mitigation

          But Ubuntu users (for example) won’t get that automatically. Canonical still has to pull the upstream release, run validation, and roll out a patch. It will probably be speedy, but still on the order of several weeks before people see it by default.

        • @[email protected]
          link
          fedilink
          English
          12 years ago

          There hasn’t been a single game I’ve struggled to run in the last few months on proton. I haven’t had a windows PC in like a year ish or more?

          I play games heavily too.

          Try it out sometime if your setup isn’t extremely niche and maybe you’ll find it to be accommodating.

          The weirdest things I’ve had to do are click a box in steam to enable proton usage and reinstall something in Lutris for Battle.net on world of warcraft.

        • Primarily0617
          link
          fedilink
          122 years ago

          I have yet to find a game that doesn’t run

          At this point I don’t even check before buying

        • peopleproblems
          link
          fedilink
          English
          532 years ago

          I know it’s not the best, but Proton has come a long, long way. I can play D4, Monster Hunter, factorio, lots of stuff.

          • @[email protected]
            link
            fedilink
            English
            272 years ago

            I’ve been testing the waters with my steam deck. There are some hiccups, but almost everything I want to play can be done with proton.

          • @[email protected]
            link
            fedilink
            English
            182 years ago

            It is really fantastic. With steam almost all the games i bother playing just works. Deleted the windows partition years ago.
            Just have to check the community forum how well it works before buying. Or just get a refund if it does not work.

          • @[email protected]
            link
            fedilink
            English
            -8
            edit-2
            2 years ago

            I know it’s not the best

            Didn’t pay thousands for top of the line ryzen and nvidia gear for “not the best” gaming situation.

            Linux falls short on two major fronts, less idiot proof, less gamer friendly, and that’s Windows’ largest market shares, idiots and gamers.

            • @[email protected]
              link
              fedilink
              English
              62 years ago

              Lmao, most games have better performance on linux so you can’t claim it’s not the best

            • conciselyverbose
              link
              fedilink
              172 years ago

              It’s almost issue free with the exception of the publishers explicitly blocking it because it doesn’t allow them to add a rootkit to your system.

              • @[email protected]
                link
                fedilink
                English
                22 years ago

                There’s still the issue of overhead and such. Like I want to ditch windows forever, but Linux is just not 100% there yet with gaming. It’s very close though.

                • @[email protected]
                  link
                  fedilink
                  English
                  22 years ago

                  There’s another launcher that I’m forgetting the name of that will launch Epic and GoG games. Following that proton guide should make NTFS (windows) drives usable for anything in Linux though. I can boot games downloaded from “alternate sites” if I add them to steam as “non steam games” regardless of how the drive is mounted.

      • @[email protected]
        link
        fedilink
        English
        42 years ago

        Highly recommend Pop OS! It’s been very reliable. I haven’t had anything this steady since Mac OS when I was just doing programming. I tried to go from Mac to Alienware for personal computing and it was terrible, windows blue screened almost once a week if not once every four days.

        Switched to Pop OS, enabled Proton in steams preferences for gaming, and it was completely steady. Only thing that doesn’t work is the hibernate. Which isn’t a super big deal to me.

        I’d actually say everything has been a better experience than windows. Lutris and pop store have a large variety of games and apps. For example lutris supports GOG and probably epic games. It feels like it’s everything I’d want without the shitty user interfaces and lack of crashes.

  • Ocelot
    link
    fedilink
    English
    -42 years ago

    This is pretty bad but it needs local access to a server/workstation as well as pretty sophisticated knowledge/tools to exploit. Even then there’s no guarantee of getting any relevant information out of it. Anything with frequent enough logins/hashes going through the local system is probably a server someplace, and if its important you should have it physically locked away and access controlled.

      • stankmut
        link
        fedilink
        English
        132 years ago

        Is there any evidence that the exploit works in a browser? A few comments on the article suggested that the Javascript engines in browsers protect against timing attacks like these.

        • Vicky
          link
          fedilink
          English
          12 years ago

          I was hoping there would be a reply to this :(