Originally posted by Alex/AT
View Post
Announcement
Collapse
No announcement yet.
Intel Working On New Hardware-Based Prevention For Spectre-BHI Attacks
Collapse
X
-
Originally posted by hotaru View Postthat "very minor number of systems" includes any system that runs a web browser. thanks to Javascript, every web browser is a shared system.
No point in fearing hurricanes all the time and doing everything that windproof at the cost too high if such didn't appear in your geographic location for at least last millenia. In theory, they can. In practice, nobody cares. It's all a matter of costs and probabilities, and if you're worried about Spectre in browsers, better worry about your run of the mill buffer overflow exploits in such and software related (PDF viewers etc.) as these are much more probable to really be exploited (and they are from time to time) as they don't require that much precision to work.
Bottom line is, browsers running any third party code can potentially be exploited in a huge variety of ways. There are no exploits in the wild that can work these CPU flaws down 'in browsers', and that's it for now. Once these appear, may be reconsidered, but probably easier fixed by adjusting how browsers do things instead of slowing down everyone CPUs for the improbable.Last edited by Alex/AT; 20 July 2022, 06:08 AM.
- Likes 1
Comment
-
Originally posted by Alex/AT View PostWeb browsers don't provide precision enough to exploit it,
Originally posted by Alex/AT View Postthe system must not be loaded otherwise - almost any side load will break it (try PoCs and see for yourself),
Originally posted by Alex/AT View PostNo point in fearing hurricanes all the time and doing everything that windproof at the cost too high if such didn't appear in your geographic location for at least last millenia. In theory, they can. In practice, nobody cares. It's all a matter of costs and probabilities, and if you're worried about Spectre in browsers, better worry about your run of the mill buffer overflow exploits in such and software related (PDF viewers etc.) as these are much more probable to really be exploited (and they are from time to time) as they don't require that much precision to work.
- Likes 2
Comment
-
Originally posted by archkde View Post
Yeah, I gather so much. However, quoting the Intel documentation: "If software sets IA32_SPEC_CTRL.IBRS to 1 after a transition to a more privileged predictor mode, predicted targets of indirect branches executed in that predictor mode with IA32_SPEC_CTRL.IBRS = 1 cannot be controlled by software that was executed in a less privileged predictor mode." And from the documentation of the new feature: "Set BHI_DIS in MSR_IA32_SPC_CTRL to prevent predicted targets of indirect branches executed in CPL0, CPL1, or CPL2 from being selected based on branch history from branches executed in CPL3. Support for this feature is enumerated by CPUID.7.2.EDX[BHI_CTRL] (bit 4)." That sounds like the same thing.
Comment
-
-
Originally posted by Alex/AT View PostOh man, you can delay death? Oh really? Godlike powers? (you never even know when and how it hits ya, so you can't actually delay it)
- Likes 2
Comment
Comment