Security Market Segment LS
Tuesday, 26 June 2018 08:57

Intel says new TLBleed flaw unrelated to Spectre or Meltdown Featured

By

Processor giant Intel says that a new vulnerability in its CPUs, known as TLBleed, is not caused by speculative execution and hence not related to Spectre and Meltdown, two flaws which were disclosed in January.

In a statement on Tuesday, an Intel spokesperson said the company had been notified of research from Vrije Universiteit Amsterdam, which outlined a potential side-channel analysis vulnerability.

Details of TLBleed — so named because the flaw targets the Translation Lookaside Buffer, a CPU cache — were leaked to the British tech site, The Register, on Friday. A paper on the topic is scheduled to be presented at the Black Hat USA 2018 conference in August.

Last week, OpenBSD project leader Theo de Raadt told  iTWire that he could not reveal details about the flaw which he said the Dutch researchers had shared with the project. In the meantime, as a precaution, OpenBSD, which is used on some of the servers with the longest uptimes, had removed support for hyperthreading, he added.

On Monday, reacting to the story, former NSA hacker Jake Williams said on Twitter that a fix for a new vulnerability in Intel processors is likely to require changes to the core operating system and would probably need "a ton of work to mitigate (mostly app recompile)".

Later in the day, De Raadt outlined some of the difficulties he could visualise in patching TLBleed, ending with the sarcastic comment, "This Intel CPU is amazing. They sure are keeping it fresh and new!"

In its Tuesday statement, Intel said: "Research on side-channel analysis methods often focuses on manipulating and measuring the characteristics (e.g. timing) of shared hardware resources. These measurements can potentially allow researchers to extract information about the software and related data.

"TLBleed uses the Translation Lookaside Buffer, a cache common to many high-performance microprocessors that stores recent address translations from virtual memory to physical memory.

"Software or software libraries such as Intel Integrated Performance Primitives Cryptography version U3.1 — written to ensure constant execution time and data independent cache traces — should be immune to TLBleed.

"Protecting our customers’ data and ensuring the security of our products is a top priority for Intel and we will continue to work with customers, partners and researchers to understand and mitigate any vulnerabilities that are identified.”

Intel was asked why the company resisted obtaining a a Common Vulnerabilities and Exposures number for TLBleed and also why the company was unwilling to pay the researchers a bug bounty.

iTWire has been given to understand that Intel had issued CVE-2018-3691 earlier this year which dealt with a vulnerability in the Intel Integrated Performance Primitives Cryptography (impacting versions prior to 2018 U2.1).

The fix to patch that flaw, which is included in versions 2018 U2.1 and 2018 U3.1, ensured constant execution time and is expected to render exploits based on TLBleed ineffective.

iTWire also understands that the bug report by the Vrije Universiteit Amsterdam researchers did not meet all of the requirements of Intel's bug bounty program.

The CVE system, a catalogue of known security threats sponsored by the US Department of Homeland Security, provides a reference method for publicly known vulnerabilities and exposures.

Read 4319 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here

SONICWALL 2022 CYBER THREAT REPORT

The past year has seen a meteoric rise in ransomware incidents worldwide.

Over the past 12 months, SonicWall Capture Labs threat researchers have diligently tracked the meteoric rise in cyberattacks, as well as trends and activity across all threat vectors, including:

Ransomware
Cryptojacking
Encrypted threats
IoT malware
Zero-day attacks and more

These exclusive findings are now available via the 2022 SonicWall Cyber Threat Report, which ensures SMBs, government agencies, enterprises and other organizations have the actionable threat intelligence needed to combat the rising tide of cybercrime.

Click the button below to get the report.

GET REPORT!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

BACK TO HOME PAGE
Sam Varghese

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Share News tips for the iTWire Journalists? Your tip will be anonymous

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments