arstechnica.com Open in urlscan Pro
3.131.220.100  Public Scan

Submitted URL: https://t.co/wKuydfo5y9
Effective URL: https://arstechnica.com/information-technology/2022/07/intel-and-amd-cpus-vulnerable-to-a-new-speculative-execution-attack/
Submission: On July 12 via manual from US — Scanned from US

Form analysis 4 forms found in the DOM

GET /search/

<form action="/search/" method="GET" id="search_form">
  <input type="hidden" name="ie" value="UTF-8">
  <input type="text" name="q" id="hdr_search_input" value="" aria-label="Search..." placeholder="Search..." class=" js-bound">
</form>

POST https://arstechnica.com/civis/ucp.php?mode=login

<form id="login-form" action="https://arstechnica.com/civis/ucp.php?mode=login" method="post">
  <input type="text" name="username" id="username" placeholder="Username or Email" aria-label="Username or Email" class=" js-bound">
  <input type="password" name="password" id="password" placeholder="Password" aria-label="Password">
  <input type="submit" value="Submit" class="button button-orange button-wide" name="login">
  <label id="remember-label">
    <input type="checkbox" name="autologin" id="autologin"> Stay logged in</label> <span>|</span> <a href="/civis/ucp.php?mode=sendpassword" data-uri="53ec6d3f65bb7762a489b7a13824e81f">Having trouble?</a>
  <input type="hidden" name="redirect" value="./ucp.php?mode=login&amp;autoredirect=1&amp;return_to=%2Finformation-technology%2F2022%2F07%2Fintel-and-amd-cpus-vulnerable-to-a-new-speculative-execution-attack%2F">
  <input type="hidden" name="return_to" value="/information-technology/2022/07/intel-and-amd-cpus-vulnerable-to-a-new-speculative-execution-attack/">
  <input type="hidden" name="from_homepage" value="1">
</form>

POST https://api.bounceexchange.com/capture/submit

<form id="bx-form-1643623-step-1" bx-novalidate="true" method="post" action="https://api.bounceexchange.com/capture/submit" onsubmit="return bouncex.submitCampaignStep(1643623); return false" onreset="bouncex.close_ad(1643623); return false"
  tabindex="0" aria-labelledby="bx-campaign-ally-title-1643623"><input type="hidden" name="campaign_id" value="1643623">
  <div class="bx-group bx-group-default bx-group-1643623-rQWiaQ5 bx-group-rQWiaQ5" id="bx-group-1643623-rQWiaQ5">
    <div class="bx-row bx-row-image bx-row-image-logo  bx-row-ICDTsc2 bx-element-1643623-ICDTsc2" id="bx-element-1643623-ICDTsc2"><img src="//assets.bounceexchange.com/assets/uploads/clients/2806/creatives/78dbf26fc8687b650f46e91adf23f5fa.svg"
        alt="logo"></div>
  </div>
  <div class="bx-group bx-group-default bx-group-1643623-9V7DjRk bx-group-9V7DjRk" id="bx-group-1643623-9V7DjRk">
    <div class="bx-row bx-row-text bx-row-text-default  bx-row-eLuSF9U bx-element-1643623-eLuSF9U" id="bx-element-1643623-eLuSF9U">
      <div>Join Ars Technica and</div>
    </div>
    <div class="bx-row bx-row-text bx-row-text-headline  bx-row-nNHNozp bx-element-1643623-nNHNozp" id="bx-element-1643623-nNHNozp">
      <div>Get Our Best Tech Stories</div>
    </div>
    <div class="bx-row bx-row-text bx-row-text-subheadline  bx-row-IMQMdcF bx-element-1643623-IMQMdcF" id="bx-element-1643623-IMQMdcF">
      <div>Delivered Straight to your Inbox.</div>
    </div>
  </div>
  <div class="bx-group bx-group-default bx-group-1643623-7Y4PFWQ bx-group-7Y4PFWQ" id="bx-group-1643623-7Y4PFWQ">
    <div class="bx-row bx-row-input bx-row-input-default  bx-row-VYWXDZZ bx-element-1643623-VYWXDZZ" id="bx-element-1643623-VYWXDZZ">
      <div class="bx-inputwrap"><input class="bx-el bx-input js-bound" id="bx-element-1643623-VYWXDZZ-input" type="email" name="email" placeholder="Email address" aria-required="true"></div>
      <div class="bx-component  bx-component-validation bx-vtext bx-error-1643623-email" id="bx-error-1643623-email">Please enter above</div>
    </div>
    <div class="bx-row bx-row-submit bx-row-submit-default  bx-row-KmYHkpO bx-element-1643623-KmYHkpO" id="bx-element-1643623-KmYHkpO"><button type="submit" class="bx-button" data-click="submit" data-step-delay="0" data-submit-jump="0"
        data-submit-force="0">SIGN ME UP</button></div>
  </div>
  <div class="bx-group bx-group-micro bx-group-1643623-yAl252D bx-group-yAl252D" id="bx-group-1643623-yAl252D">
    <div class="bx-row bx-row-text bx-row-text-sosumi  bx-row-0aOCKMV bx-element-1643623-0aOCKMV" id="bx-element-1643623-0aOCKMV">
      <div>By signing up, you agree to our <a href="https://www.condenast.com/user-agreement" target="_blank" style="text-decoration: underline; display: inline;">user agreement</a> (including the
        <a href="https://www.condenast.com/user-agreement#section-viii-g" target="_blank" style="text-decoration: underline; display: inline;"> class action waiver and arbitration provisions</a>), our
        <a href="https://www.condenast.com/privacy-policy" target="_blank" style="text-decoration: underline; display: inline;">privacy policy and cookie statement</a>, and to receive marketing and account-related emails from Ars Technica. You can
        unsubscribe at any time.</div>
    </div>
  </div><input autocomplete="carb-trap" type="input" name="carb-trap" tabindex="-1" aria-hidden="true" class="bx-input bx-carb-trap">
</form>

POST https://api.bounceexchange.com/capture/submit

<form id="bx-form-1643623-step-2" bx-novalidate="true" method="post" action="https://api.bounceexchange.com/capture/submit" onsubmit="return bouncex.submitCampaignStep(1643623); return false" onreset="bouncex.close_ad(1643623); return false"
  tabindex="0" aria-labelledby="bx-campaign-ally-title-1643623"><input type="hidden" name="campaign_id" value="1643623">
  <div class="bx-group bx-group-default bx-group-1643623-VnlQ1Q6 bx-group-VnlQ1Q6" id="bx-group-1643623-VnlQ1Q6">
    <div class="bx-row bx-row-image bx-row-image-logo  bx-row-wuBSHw3 bx-element-1643623-wuBSHw3" id="bx-element-1643623-wuBSHw3"><img src="//assets.bounceexchange.com/assets/uploads/clients/2806/creatives/78dbf26fc8687b650f46e91adf23f5fa.svg"
        alt=""></div>
  </div>
  <div class="bx-group bx-group-default bx-group-1643623-YytTDny bx-group-YytTDny" id="bx-group-1643623-YytTDny">
    <div class="bx-row bx-row-text bx-row-text-default  bx-row-73sFtao bx-element-1643623-73sFtao" id="bx-element-1643623-73sFtao">
      <div>Thanks!</div>
    </div>
    <div class="bx-row bx-row-text bx-row-text-headline  bx-row-YJNA5ZQ bx-element-1643623-YJNA5ZQ" id="bx-element-1643623-YJNA5ZQ">
      <div>You Are Successfully Subscribed</div>
    </div>
  </div>
</form>

Text Content

Skip to main content
 * Biz & IT
 * Tech
 * Science
 * Policy
 * Cars
 * Gaming & Culture
 * Store
 * Forums

Subscribe

Close


NAVIGATE

 * Store
 * Subscribe
 * Videos
 * Features
 * Reviews

 * RSS Feeds
 * Mobile Site

 * About Ars
 * Staff Directory
 * Contact Us

 * Advertise with Ars
 * Reprints


FILTER BY TOPIC

 * Biz & IT
 * Tech
 * Science
 * Policy
 * Cars
 * Gaming & Culture
 * Store
 * Forums


SETTINGS

Front page layout


Grid


List


Site theme

Black on white

White on black

Sign in


COMMENT ACTIVITY

Sign up or login to join the discussions!

Stay logged in | Having trouble?
Sign up to comment and more Sign up

RETBLEED —


NEW WORKING SPECULATIVE EXECUTION ATTACK SENDS INTEL AND AMD SCRAMBLING


BOTH COMPANIES ARE ROLLING OUT MITIGATIONS, BUT THEY ADD OVERHEAD OF 12 TO 28
PERCENT.

Dan Goodin - 7/12/2022, 4:00 PM

Enlarge

READER COMMENTS

39 with 28 posters participating

SHARE THIS STORY

 * Share on Facebook
 * Share on Twitter
 * Share on Reddit

Some microprocessors from Intel and AMD are vulnerable to a newly discovered
speculative execution attack that can covertly leak password data and other
sensitive material, sending both chipmakers scrambling once again to contain
what is proving to be a stubbornly persistent vulnerability.

Researchers from ETH Zurich have named their attack Retbleed because it exploits
a software defense known as retpoline, which was introduced in 2018 to mitigate
the harmful effects of speculative execution attacks. Speculative execution
attacks, also known as Spectre, exploit the fact that when modern CPUs encounter
a direct or indirect instruction branch, they predict the address for the next
instruction they’re about to receive and automatically execute it before the
prediction is confirmed. Spectre works by tricking the CPU into executing an
instruction that accesses sensitive data in memory that would normally be
off-limits to a low-privileged application. Retbleed then extracts the data
after the operation is canceled.


IS IT A TRAMPOLINE OR A SLINGSHOT?




FURTHER READING

“Meltdown” and “Spectre:” Every modern processor has unfixable security flaws
Retpoline works by using a series of return operations to isolate indirect
branches from speculative execution attacks, in effect erecting the software
equivalent of a trampoline that causes them to safely bounce. Stated
differently, a retpoline works by replacing indirect jumps and calls with
returns, which many researchers presumed weren’t susceptible. The defense was
designed to counter variant 2 of the original speculative execution attacks from
January 2018. Abbreviated as BTI, the variant forces an indirect branch to
execute so-called “gadget” code, which in turn creates data to leak through a
side channel.

Some researchers have warned for years that retpoline isn’t sufficient to
mitigate speculative execution attacks because the returns retpoline used were
susceptible to BTI. Linux creator Linus Torvalds famously rejected such
warnings, arguing that such exploits weren’t practical.

The ETH Zurich researchers have conclusively shown that retpoline is
insufficient for preventing speculative execution attacks. Their Retbleed
proof-of-concept works against Intel CPUs with the Kaby Lake and Coffee Lake
microarchitectures and AMD Zen 1, Zen 1+, and Zen 2 microarchitectures.

Advertisement


“Retpoline, as a Spectre-BTI mitigation, fails to consider return instructions
as an attack vector,” researchers Johannes Wikner and Kaveh Razavi wrote. “While
it is possible to defend return instructions by adding a valid entry to the RSB
[return stack buffer] before executing the return instruction, treating every
return as potentially exploitable in this way would impose a tremendous
overhead. Previous work attempted to conditionally refill the RSB with harmless
return targets whenever a perCPU counter that tracks the call stack depth
reaches a certain threshold, but it was never approved for upstream. In the
light of Retbleed, this mitigation is being re-evaluated by Intel, but AMD CPUs
require a different strategy.”

In an email, Razavi explained it this way:

> Spectre variant 2 exploited indirect branches to gain arbitrary speculative
> execution in the kernel. Indirect branches were converted to returns using the
> retpoline to mitigate Spectre variant 2.
> 
> Retbleed shows that return instructions unfortunately leak under certain
> conditions similar to indirect branches. These conditions are unfortunately
> common on both Intel (Skylake and Skylake-based) and AMD (Zen, Zen+ and Zen2)
> platforms. This means that retpoline was unfortunately an inadequate
> mitigation to begin with.

In response to the research, both Intel and AMD advised customers to adopt new
mitigations that the researchers said will add as much as 28 percent more
overhead to operations.

Retbleed can leak kernel memory from Intel CPUs at about 219 bytes per second
and with 98 percent accuracy. The exploit can extract kernel memory from AMD
CPUs with a bandwidth of 3.9 kB per second. The researchers said that it’s
capable of locating and leaking a Linux computer’s root password hash from
physical memory in about 28 minutes when running the Intel CPUs and in about 6
minutes for AMD CPUs.

Retbleed works by using code that essentially poisons the branch prediction unit
that CPUs rely on to make their guesses. Once the poisoning is complete, this
BPU will make mispredictions that the attacker can control.

“We found that we can inject branch targets that reside inside the kernel
address-space, even as an unprivileged user,” the researchers wrote in a blog
post. “Even though we cannot access branch targets inside the kernel
address-space—branching to such a target results in a page fault—the Branch
Prediction Unit will update itself upon observing a branch and assume that it
was legally executed, even if it's to a kernel address.”

Page: 1 2 Next →


ARS VIDEO


HOW THE NES CONQUERED A SKEPTICAL AMERICA IN 1985





READER COMMENTS

39 with 28 posters participating

SHARE THIS STORY

 * Share on Facebook
 * Share on Twitter
 * Share on Reddit

Enter your email to get the Ars Technica newsletter
close dialog
Join Ars Technica and
Get Our Best Tech Stories
Delivered Straight to your Inbox.
Please enter above
SIGN ME UP
By signing up, you agree to our user agreement (including the class action
waiver and arbitration provisions), our privacy policy and cookie statement, and
to receive marketing and account-related emails from Ars Technica. You can
unsubscribe at any time.
Thanks!
You Are Successfully Subscribed
close dialog
Dan Goodin Dan is the Security Editor at Ars Technica, which he joined in 2012
after working for The Register, the Associated Press, Bloomberg News, and other
publications.
Email dan.goodin@arstechnica.com // Twitter @dangoodin001

Advertisement


You must login or create an account to comment.




CHANNEL ARS TECHNICA

UNSOLVED MYSTERIES OF QUANTUM LEAP WITH DONALD P. BELLISARIO

Today "Quantum Leap" series creator Donald P. Bellisario joins Ars Technica to
answer once and for all the lingering questions we have about his enduringly
popular show. Was Dr. Sam Beckett really leaping between all those time periods
and people or did he simply imagine it all? What do people in the waiting room
do while Sam is in their bodies? What happens to Sam's loyal ally Al? 30 years
following the series finale, answers to these mysteries and more await.

 * UNSOLVED MYSTERIES OF QUANTUM LEAP WITH DONALD P. BELLISARIO

 * UNSOLVED MYSTERIES OF WARHAMMER 40K WITH AUTHOR DAN ABNETT

 * SITREP: F-16 REPLACEMENT SEARCH A SIGNAL OF F-35 FAIL?

 * SITREP: BOEING 707

 * STEVE BURKE OF GAMERSNEXUS REACTS TO THEIR TOP 1000 COMMENTS ON YOUTUBE

 * MODERN VINTAGE GAMER REACTS TO HIS TOP 1000 COMMENTS ON YOUTUBE

 * HOW THE NES CONQUERED A SKEPTICAL AMERICA IN 1985

 * SCOTT MANLEY REACTS TO HIS TOP 1000 YOUTUBE COMMENTS

 * HOW HORROR WORKS IN AMNESIA: REBIRTH, SOMA AND AMNESIA: THE DARK DESCENT

 * LGR'S CLINT BASINGER REACTS TO HIS TOP 1000 YOUTUBE COMMENTS

 * THE F-35'S NEXT TECH UPGRADE

 * HOW ONE GAMEPLAY DECISION CHANGED DIABLO FOREVER

 * UNSOLVED MORTAL KOMBAT MYSTERIES WITH DOMINIC CIANCIOLO FROM NETHERREALM
   STUDIOS

 * US NAVY GETS AN ITALIAN ACCENT

 * HOW AMAZON’S “UNDONE” ANIMATES DREAMS WITH ROTOSCOPING AND OIL PAINTS

 * FIGHTER PILOT BREAKS DOWN EVERY BUTTON IN AN F-15 COCKPIT

 * HOW NBA JAM BECAME A BILLION-DOLLAR SLAM DUNK

 * LINUS "TECH TIPS" SEBASTIAN REACTS TO HIS TOP 1000 YOUTUBE COMMENTS

 * HOW ALAN WAKE WAS REBUILT 3 YEARS INTO DEVELOPMENT

 * HOW PRINCE OF PERSIA DEFEATED APPLE II'S MEMORY LIMITATIONS

 * HOW CRASH BANDICOOT HACKED THE ORIGINAL PLAYSTATION

 * MYST: THE CHALLENGES OF CD-ROM | WAR STORIES

 * MARKIPLIER REACTS TO HIS TOP 1000 YOUTUBE COMMENTS

 * HOW MIND CONTROL SAVED ODDWORLD: ABE'S ODDYSEE

 * BIOWARE ANSWERS UNSOLVED MYSTERIES OF THE MASS EFFECT UNIVERSE

 * CIVILIZATION: IT'S GOOD TO TAKE TURNS | WAR STORIES

 * SITREP: DOD RESETS BALLISTIC MISSILE INTERCEPTOR PROGRAM

 * WARFRAME'S REBECCA FORD REVIEWS YOUR CHARACTERS

 * SUBNAUTICA: A WORLD WITHOUT GUNS | WAR STORIES

 * HOW SLAY THE SPIRE’S ORIGINAL INTERFACE ALMOST KILLED THE GAME | WAR STORIES

 * AMNESIA: THE DARK DESCENT - THE HORROR FACADE | WAR STORIES

 * COMMAND & CONQUER: TIBERIAN SUN | WAR STORIES

 * BLADE RUNNER: SKINJOBS, VOXELS, AND FUTURE NOIR | WAR STORIES

 * DEAD SPACE: THE DRAG TENTACLE | WAR STORIES

 * TEACH THE CONTROVERSY: FLAT EARTHERS

 * DELTA V: THE BURGEONING WORLD OF SMALL ROCKETS, PAUL ALLEN'S HUGE PLANE, AND
   SPACEX GETS A CRUCIAL GREEN-LIGHT

 * CHRIS HADFIELD EXPLAINS HIS 'SPACE ODDITY' VIDEO

 * THE GREATEST LEAP, EPISODE 1: RISK

 * ULTIMA ONLINE: THE VIRTUAL ECOLOGY | WAR STORIES

More videos
← Previous story Next story →


RELATED STORIES

Sponsored Stories
The Best States to Retire in 2022 SmartAsset

Ad is Hidden
Please tell us why you hid this ad?
 * Inappropriate
 * Misleading
 * Misinformation
 * Repetitive
 * Irrelevant
 * Distracting


Best Car Insurance For Seniors Living in Florida Save Money | Car Insurance

Ad is Hidden
Please tell us why you hid this ad?
 * Inappropriate
 * Misleading
 * Misinformation
 * Repetitive
 * Irrelevant
 * Distracting


If you're over 40 - this game is a must! raid: shadow legends

Ad is Hidden
Please tell us why you hid this ad?
 * Inappropriate
 * Misleading
 * Misinformation
 * Repetitive
 * Irrelevant
 * Distracting


Do This if You Have Toenail Fungus (Try Tonight) Health Tips Journal

Ad is Hidden
Please tell us why you hid this ad?
 * Inappropriate
 * Misleading
 * Misinformation
 * Repetitive
 * Irrelevant
 * Distracting


Florida Will Cover The Cost To Install Solar if You Live in Miami Solar Advice
Today

Ad is Hidden
Please tell us why you hid this ad?
 * Inappropriate
 * Misleading
 * Misinformation
 * Repetitive
 * Irrelevant
 * Distracting


Actors Who Fell In Love With Their Onscreen Siblings Definition

Ad is Hidden
Please tell us why you hid this ad?
 * Inappropriate
 * Misleading
 * Misinformation
 * Repetitive
 * Irrelevant
 * Distracting


Recommended by



TODAY ON ARS

 * Store
 * Subscribe
 * About Us
 * RSS Feeds
 * View Mobile Site

 * Contact Us
 * Staff
 * Advertise with us
 * Reprints


NEWSLETTER SIGNUP

Join the Ars Orbital Transmission mailing list to get weekly updates delivered
to your inbox.

Sign me up →

CNMN Collection
WIRED Media Group
© 2022 Condé Nast. All rights reserved. Use of and/or registration on any
portion of this site constitutes acceptance of our User Agreement (updated
1/1/20) and Privacy Policy and Cookie Statement (updated 1/1/20) and Ars
Technica Addendum (effective 8/21/2018). Ars may earn compensation on sales from
links on this site. Read our affiliate link policy.
Your California Privacy Rights | Cookies Settings
The material on this site may not be reproduced, distributed, transmitted,
cached or otherwise used, except with the prior written permission of Condé
Nast.
Ad Choices