Overclock.net - An Overclocking Community - View Single Post - [Phoronix] New ZombieLoad Side-Channel Attack Variant: TSX Asynchronous Abort
View Single Post
post #1 of (permalink) Old 11-12-2019, 03:08 PM - Thread Starter
Imouto
New to Overclock.net
 
Imouto's Avatar
 
Join Date: Mar 2012
Posts: 2,172
Rep: 232 (Unique: 109)
[Phoronix] New ZombieLoad Side-Channel Attack Variant: TSX Asynchronous Abort

Quote:
Current Intel hardware mitigations do not cover TAA and current Cascade Lake CPUs remain vulnerable. TAA can allow leaking of data across processes, privilege boundaries and Hyper Threading. With Hyper Threading disabled, TAA can still leak data from protected domains.

For mitigating TAA Asynchronous Abort there is no new software workaround out today short of disabling Intel TSX. It is recommended to disable Hyper Threading while Cyberus ultimately recommends running trusted/untrusted applications on separate physical systems.
https://www.phoronix.com/scan.php?pa...-TAA-Announced

* Laughs in "I told you so" *

Hardware mitigations only cover known attacks and do not cover the vector. Unless Intel builds a CPU from the ground up these will keep popping like mushrooms... (MUSHROOM!!!).

#EnthusiastLivesMatter
Imouto is offline