this post was submitted on 14 May 2025
220 points (97.8% liked)

Technology

69999 readers
4668 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 
  • The new class of vulnerabilities in Intel processors arises from speculative technologies that anticipate individual computing steps.
  • Openings enable gradual reading of entire privilege memory contents of shared processor (CPU).
  • All Intel processors from the last 6 years are affected, from PCs to servers in data centres.
top 17 comments
sorted by: hot top controversial new old
[–] pastermil@sh.itjust.works 3 points 1 hour ago

Thankfully my Thinkpads from the last decade are not affected.

[–] Cocodapuf@lemmy.world 7 points 8 hours ago* (last edited 8 hours ago) (2 children)

This sounds just like Spectre/heartbleed. Haven't we learned our lesson with speculative computation? I guess not...

Well you know what they say, if it was a bad idea 10 fucking years ago, then let's do it again!

[–] gedhrel@lemmy.world 2 points 28 minutes ago

With massive OOO pipelines, what's the alternative?

[–] Bogus007@lemm.ee 2 points 8 hours ago

Intel has not learned, still making money on crap chips.

[–] domi@lemmy.secnd.me 36 points 20 hours ago

Intel has already deployed a fix for this in the 13th and 14th gen by permanently damaging the chip and crashing. Checkmate hackers.

[–] kibiz0r@midwest.social 46 points 21 hours ago

Another day, another speculative execution vulnerability.

[–] sunnie@slrpnk.net 67 points 1 day ago (1 children)

No catchy name for the vulnerability? It can’t be that bad, then…

[–] rockSlayer@lemmy.blahaj.zone 38 points 1 day ago (1 children)

Let's call it Son of Spectre

[–] b3an@lemmy.world 7 points 16 hours ago

Bond, James Bond. Junior.

[–] boreengreen@lemm.ee 22 points 22 hours ago* (last edited 22 hours ago) (2 children)

This vulnerability fundamentally undermines data security, particularly in the cloud environment where many users share the same hardware resources.

Intel gets punched again.

[–] Krudler@lemmy.world 1 points 5 hours ago

I feel pretty duh here. That's a great point.

[–] msage@programming.dev 1 points 5 hours ago

Who, my good friend, fucking WHO still buys Intel for the servers? It sucks so hard, I don't get it.

[–] naeap@sopuli.xyz 18 points 22 hours ago* (last edited 22 hours ago)

Anyone having a link to a more technical (detailed) description?
This is quite novice orientated and I'd be very interested on how it actually works. Is there anything already disclosed?

Edit: link at the end to the original research/more detailed explanation:
https://comsec.ethz.ch/research/microarch/branch-privilege-injection/

[–] ObviouslyNotBanana@lemmy.world 24 points 1 day ago (1 children)

Finally! I've been waiting to expose my processor

[–] DemandtheOxfordComma@lemmy.dbzer0.com 17 points 23 hours ago (1 children)
[–] ObviouslyNotBanana@lemmy.world 7 points 23 hours ago (1 children)
[–] InnerScientist@lemmy.world 16 points 22 hours ago

Intel Outside