{"id":59366,"date":"2023-08-09T15:12:26","date_gmt":"2023-08-09T19:12:26","guid":{"rendered":"http:\/\/pappp.net\/?guid=5e0e96347c029913e9956286ae883050"},"modified":"2023-08-09T15:12:26","modified_gmt":"2023-08-09T19:12:26","slug":"downfall-bug-affects-years-of-intel-cpus-can-leak-encryption-keys-and-more","status":"publish","type":"post","link":"https:\/\/pappp.net\/?p=59366","title":{"rendered":"\u201cDownfall\u201d bug affects years of Intel CPUs, can leak encryption keys and more"},"content":{"rendered":"<p class=\"syndicated-attribution\">Source: <a href=\"https:\/\/arstechnica.com\/?p=1959890\">Ars Technica<\/a><\/p>\n<div style=\"background-color : #fff7d5;\n\t\t\tborder-width : 1px; padding : 5px; border-style : dashed; border-color : #e7d796;margin-bottom : 1em; color : #9a8c59;\">Article note: At this point the article might as well be a digest about \"This month's speculative execution vulnerabilities for each of the major platforms.\"<\/div><div>\n<figure>\n  <img src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2023\/08\/DSC09738-800x535.jpg\" alt=\"An 8th-generation Intel Core desktop CPU, one of several CPU generations affected by the Downfall bug.\" referrerpolicy=\"no-referrer\" loading=\"lazy\"\/>\n      <p><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2023\/08\/DSC09738.jpg\" rel=\"noopener noreferrer\">Enlarge<\/a> <span>\/<\/span> An 8th-generation Intel Core desktop CPU, one of several CPU generations affected by the Downfall bug. (credit: Mark Walton)<\/p>  <\/figure>\n\n\n\n\n\n\n<div><a name=\"page-1\"><\/a><\/div>\n<p>It's a big week for CPU security vulnerabilities. Yesterday, different security researchers published details on two different vulnerabilities, one affecting multiple generations of Intel processors and another affecting the newest AMD CPUs. \"<a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00828.html\" rel=\"noopener noreferrer\">Downfall<\/a>\" and \"<a href=\"https:\/\/www.amd.com\/en\/resources\/product-security\/bulletin\/amd-sb-7005.html\" rel=\"noopener noreferrer\">Inception<\/a>\" (respectively) are different bugs, but both involve modern processors' extensive use of speculative execution (a la the original <a href=\"https:\/\/arstechnica.com\/gadgets\/2018\/01\/meltdown-and-spectre-every-modern-processor-has-unfixable-security-flaws\/\" rel=\"noopener noreferrer\">Meltdown and Spectre bugs<\/a>), both are described as being of \"medium\" severity, and both can be patched either with OS-level microcode updates or firmware updates with fixes incorporated.<\/p>\n<p>AMD and Intel have both already released OS-level microcode software updates to address both issues. Both companies have also said that they're not aware of any active in-the-wild exploits of either vulnerability. Consumer, workstation, and server CPUs are all affected, making patching particularly important for server administrators.<\/p>\n<p>It will be up to your PC, server, or motherboard manufacturer to release firmware updates with the fixes after Intel and AMD make them available.<\/p><\/div><p><a href=\"https:\/\/arstechnica.com\/?p=1959890#p3\" rel=\"noopener noreferrer\">Read 13 remaining paragraphs<\/a> | <a href=\"https:\/\/arstechnica.com\/?p=1959890&amp;comments=1\" rel=\"noopener noreferrer\">Comments<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Enlarge \/ An 8th-generation Intel Core desktop CPU, one of several CPU generations affect&#8230;<\/p>\n<p> <a href=\"https:\/\/pappp.net\/?p=59366\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[226],"tags":[],"class_list":["post-59366","post","type-post","status-publish","format-standard","hentry","category-news-2"],"_links":{"self":[{"href":"https:\/\/pappp.net\/index.php?rest_route=\/wp\/v2\/posts\/59366","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pappp.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pappp.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pappp.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pappp.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=59366"}],"version-history":[{"count":0,"href":"https:\/\/pappp.net\/index.php?rest_route=\/wp\/v2\/posts\/59366\/revisions"}],"wp:attachment":[{"href":"https:\/\/pappp.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=59366"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pappp.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=59366"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pappp.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=59366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}