Close Menu
  • Graphic cards
  • Laptops
  • Monitors
  • Motherboard
  • Processors
  • Smartphones
  • Smartwatches
  • Solid state drives
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Dutchieetech
Subscribe Now
  • Graphic cards
  • Laptops
  • Monitors
  • Motherboard
  • Processors
  • Smartphones
  • Smartwatches
  • Solid state drives
Dutchieetech
Processors

GDS: Microsoft, Intel confirm “Downfall” of 7th, 8th, 9th, 10th, 11th Gen CPUs, firmware out

dutchieetech.comBy dutchieetech.com23 August 2023No Comments2 Mins Read

Intel and Microsoft have confirmed that almost all of Intel”s desktop processors, prior to 12th Gen CPUs, are vulnerable to a new Transient Execution or Speculative execution side-channel attack called Gather Data Sampling (GDS) vulnerability (codenamed “Downfall”). The new GDS flaw, dubbed “Downfall”, is tracked under CVE-2022-40982.

Intel says that 12th Gen and newer chips, like Alder Lake and Raptor Lake, come with Intel”s Trust Domain eXtension or TDX which isolates virtual machines (VMs) from virtual machine managers (VMMs) or hypervisors, hence isolating them from the rest of the hardware and the system. These hardware-isolated virtual machines are essentially what “Trust Domains” are and hence the name.




On its support document KB5029778, Microsoft explains:

Microsoft is aware of a new transient execution attack named gather data sampling (GDS) or “Downfall.” This vulnerability could be used to infer data from affected CPUs across security boundaries such as user-kernel, processes, virtual machines (VMs), and trusted execution environments.

Intel goes into more detail about Downfall or GDS on its website explaining how attackers can exploit stale data on Intel”s 7th Gen (Kaby Lake), 8th Gen (Coffee Lake), 9th Gen (Coffee Lake refresh), 10th Gen (Comet Lake) and 11th Gen (Rocket Lake on desktop/Tiger Lake on mobile), which lack previously mentioned TDX. It writes:

Gather Data Sampling (GDS) is a transient execution side channel vulnerability affecting certain Intel processors. In some situations when a gather instruction performs certain loads from memory, it may be possible for a malicious attacker to use this type of instruction to infer stale data from previously used vector registers. These entries may correspond to registers previously used by the same thread, or by the sibling thread on the same processor core.

Intel has confirmed the issue is resolved by microcode update (MCU) or Intel Platform Update (IPU) version 20230808 as the mitigation is enabled by default. Hence, users with 7th Gen, up to 11th Gen Intel CPUs are advised to update their motherboard firmware. You can do so by visiting the support section of your motherboard manufacturer”s website.




Though it notes that there may be some performance hit, in which case users can choose to “opt out”. Head over to Intel”s security advisory (INTEL-SA-00828) for more details.

Source link

dutchieetech.com
  • Website

Related Posts

Intel simply up to date us on sport crashes, and it’s not trying good

21 June 2024

Intel Publishes Steerage For Crashing Core I9 Processors, ETVB Bugfix On The Approach – Pokde.Internet

21 June 2024

Linux 6.10 Fixes AMD Zen 5 CPU Frequency Reporting With cpupower

6 June 2024

Intel Unveils Core Extremely Processor with Built-in AI Capabilities

6 June 2024

AORUS Tachyon, AORUS Master, AORUS Ultra, AORUS Elite, AERO G

6 June 2024

Intel particulars its Lunar Lake structure with spectacular enhancements

4 June 2024
Leave A Reply Cancel Reply

You must be logged in to post a comment.

Legal Pages
  • Disclaimer
  • Privacy Policy
  • About Us
  • Contact Us

Type above and press Enter to search. Press Esc to cancel.