Foreshadow attacks Intel CPUs with Spectre-like tactics (but you're probably safe)
Close Ad
document.write('
consent.ads.queue.push(function()
try
IDG.GPT.addDisplayedAd("gpt-superstitial", "true");
$('#gpt-superstitial').responsiveAd(screenSize:'971 1115', scriptTags: );
IDG.GPT.log("Creating ad: gpt-superstitial [971 1115]");
catch (exception)
console.log("Error with IDG.GPT: " + exception);
);
Close Ad
document.write('
Close Ad
Home
Home
Learn more about PCWorld's Digital Editions
Home
consent.ads.queue.push(function()
$.getScript( "//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js" )
.done(function( script, textStatus )
//need to add && publisherConsents.gdprApplies back to the end of this conditional after testing
if (!consent.personalization && consent.isEU) ).requestNonPersonalizedAds=1
console.log('*****GDPR: loaded adsense in non-personalized mode')
else
)
.fail(function( jqxhr, settings, exception )
console.log( "Triggered ajaxError handler." );
);
);
Foreshadow attacks Intel CPUs with Spectre-like tactics (but you're probably safe)
try
performance.mark("mark_headline_rendered");
catch(e)
console.log("Error saving performance mark -- this function may not be supported in this browser");
You should be protected from L1TF if your PC is patched and up to date.
consent.ads.queue.push(function()
try
IDG.GPT.addDisplayedAd("gpt-leaderboard", "true");
$('#gpt-leaderboard').responsiveAd(screenSize:'971 1115', scriptTags: );
IDG.GPT.log("Creating ad: gpt-leaderboard [971 1115]");
catch (exception)
console.log("Error with IDG.GPT: " + exception);
);
consent.ads.queue.push(function()
try
IDG.GPT.addDisplayedAd("gpt-leaderboardmobile", "true");
$('#gpt-leaderboardmobile').responsiveAd(screenSize:'971 1115', scriptTags: );
IDG.GPT.log("Creating ad: gpt-leaderboardmobile [971 1115]");
catch (exception)
console.log("Error with IDG.GPT: " + exception);
);
consent.ads.queue.push(function()
if($(window).width() >= 930)
IDG.GPT.addDisplayedAd("gpt-showcase", "true");
$('#gpt-showcase').responsiveAd(screenSize:'971 1115', scriptTags: );
IDG.GPT.log("Creating ad: gpt-showcase - [971 1115]");
);
consent.ads.queue.push(function()
IDG.GPT.addDisplayedAd("inread", "true");
IDG.GPT.displayGoogleTagSlot('inread');
);
var dataLayer = window.dataLayer = window.dataLayer || ;
dataLayer.push(
'event': 'loadTopCollectionModule'
);
$(document).ready(function() {
$('.articleBloxAd').filter( ":visible" ).each(function(index, item) {
var id = $(item).attr('id');
var divClass = $(item).attr('class');
var adString = IDG.GPT.getLazyAdCode();
$(item).replaceWith("
Thank you
Your message has been sent.
Sorry
There was an error emailing this page.
To
Use commas to separate multiple email addresses
From
Privacy Policy
Thank you
Your message has been sent.
Sorry
There was an error emailing this page.
consent.ads.queue.push(function()
try
IDG.GPT.addDisplayedAd("gpt-leaderboard", "true");
$('#gpt-leaderboard').responsiveAd(screenSize:'971 1115', scriptTags: );
IDG.GPT.log("Creating ad: gpt-leaderboard [971 1115]");
catch (exception)
console.log("Error with IDG.GPT: " + exception);
);
consent.ads.queue.push(function()
try
IDG.GPT.addDisplayedAd("gpt-leaderboard", "true");
$('#gpt-leaderboard').responsiveAd(screenSize:'971 1115', scriptTags: );
IDG.GPT.log("Creating ad: gpt-leaderboard [971 1115]");
catch (exception)
console.log("Error with IDG.GPT: " + exception);
);
Solving Spectre and Meltdown may ultimately require an entirely new type of...
What you need to know about Speculative Store Bypass, the Spectre-like...
Meltdown and Spectre FAQ: How the critical CPU flaws affect PCs and Macs
Video
What you need to know about Meltdown and Spectre
consent.ads.queue.push(function()
if($(window).width() >= 930)
IDG.GPT.addDisplayedAd("gpt-showcase", "true");
$('#gpt-showcase').responsiveAd(screenSize:'971 1115', scriptTags: );
IDG.GPT.log("Creating ad: gpt-showcase - [971 1115]");
);
consent.ads.queue.push(function()
IDG.GPT.addDisplayedAd("inread", "true");
IDG.GPT.displayGoogleTagSlot('inread');
);
Move over, Meltdown and Spectre. A new “Foreshadow” attack, alternatively called L1 Terminal Fault or L1TF, targets Intel’s Security Guard Extensions (SGX) within its Core chips.
You should be safe, though, if you’ve already patched your PC as part of the earlier Spectre and Meltdown mitigations that rolled out over the course of the year, according to a blog post from Intel, which disclosed the flaw today. (Wired has more of the technical backstory on the bug itself, and Intel has published a video explaining the issue.) Microsoft is also rolling out patches, Intel said.
Security Guard Extensions, or SGX, were originally designed to protect code from disclosure or modification, according to Intel. It’s a feature that’s included in 7th-generation Core chips and above, as well as the corresponding Xeon generation. According to Intel, it “remains protected even when the BIOS, VMM, operating system, and drivers are compromised, implying that an attacker with full execution control over the platform can be kept at bay.”
That apparently isn’t totally the case. Wired hypothesized that the Foreshadow bug could break down the walls between virtual machines, a real concern for cloud companies whose services share space with other theoretically isolated processes.
Intel says the L1TF bug, in addition to being addressed by software mitigations, is also being patched at the hardware level with Cascade Lake, an upcoming Xeon chip, as well as future Intel processors expected to launch later this year.
Like Spectre and Meltdown, though, Intel said there’s been no real-world cases of PCs being affected by the bug. In an interesting twist, Intel is working with cloud providers—where uptime and performance is key—to “detect L1TF-based exploits during system operation, applying mitigation only when necessary,” Leslie Culbertson, executive vice president and general manager of Product Assurance and Security at Intel, wrote.
AMD also said in a statement Wednesday that it believes it is not affected by the Foreshadow bugs. “We are advising customers running AMD Epyc processors in their data centers, including in virtualized environments, to not implement Foreshadow-related software mitigations for their AMD platforms,” the company said in a statement.
What this means for you: Patch, patch, patch. As Wired notes, calling the vulnerability “Foreshadow” may be correct, as there have been a number of attacks on Intel’s Core chips—and AMD chips, too—that take advantage of speculative execution. As long as you’re patched up, you should be okay. Check out PCWorld’s guide on how to protect your PC against Meltdown and Spectre for the full details.
Updated at 2:41 PM on August 15 with a statement from AMD.
Select One
CIO
CIO Asia
Computerworld
CSO
Gamestar
Greenbot
IDG Connect
IDG.tv
InfoWorld
IT News
ITworld
JavaWorld
Macworld
Network World
PCWorld
TechHive
The Full Nerd
Copyright © 2018 IDG Communications, Inc.
Clash Royale CLAN TAG#URR8PPP