Last active
April 29, 2024 05:31
-
-
Save tenpoku1000/8d31abef480f6d7ea58f501c29855162 to your computer and use it in GitHub Desktop.
Revisions
-
tenpoku1000 revised this gist
Apr 29, 2024 . 1 changed file with 68 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -213,7 +213,7 @@ https://www.intel.com/content/www/us/en/developer/articles/technical/software-se Processors Affected: Special Register Buffer Data Sampling https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/resources/processors-affected-srbds.html ## (16) CVE-2020-8694/CVE-2020-8695 PLATYPUS:With Great Power comes Great Leakage PLATYPUS: With Great Power comes Great Leakage https://platypusattack.com/ @@ -224,6 +224,73 @@ https://www.intel.com/content/www/us/en/developer/articles/technical/software-se INTEL-SA-00389 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html ## (17) CVE-2022-24436 Hertzbleed Attack:Frequency Throttling Side Channel Guidance Hertzbleed Attack https://www.hertzbleed.com/ Frequency Throttling Side Channel Guidance https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/best-practices/frequency-throttling-side-channel-guidance.html INTEL-SA-00698 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00698.html 暗号実装における周波数サイドチャネル攻撃のソフトウェア・ガイダンス https://www.isus.jp/wp-content/uploads/pdf/887_frequency-throttling-side-channel-guidance.pdf ## (18) CVE-2022-0001/CVE-2022-0002 BHI:Branch History Injection and Intra-mode Branch Target Injection Branch History Injection and Intra-mode Branch Target Injection https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/branch-history-injection.html Branch History Injection and Intra-mode Branch Target Injection https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html INTEL-SA-00598 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html ブランチヒストリーインジェクション〜シン・すべてがNになる〜 - エンタングルメントosugi3yのブログ https://osugi3y.hatenablog.com/entry/2022/03/13/121244 ## (19) CVE-2022-29901 Retbleed:Return Stack Buffer Underflow Retbleed - Wikipedia https://en.wikipedia.org/wiki/Retbleed Retbleed: Arbitrary Speculative Code Execution with Return Instructions - Computer Security Group https://comsec.ethz.ch/research/microarch/retbleed/ Return Stack Buffer Underflow / CVE-2022-29901, CVE-2022-28693 /... https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/return-stack-buffer-underflow.html INTEL-SA-00702 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html ## (20) CVE-2022-40982 Downfall:Gather Data Sampling Downfall (security vulnerability) - Wikipedia https://en.wikipedia.org/wiki/Downfall_(security_vulnerability) Downfall https://downfall.page/ Gather Data Sampling https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/gather-data-sampling.html INTEL-SA-00828 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html 【再掲】【海外記事】 Gather Data Sampling|ささだんご🎋🍡 https://note.com/sasadango_0503/n/n60651542019b ## (21) CVE-2023-28746 Register File Data Sampling(RFDS) Register File Data Sampling https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/register-file-data-sampling.html INTEL-SA-00898 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html ## 参考資料 Transient execution CPU vulnerability - Wikipedia -
tenpoku1000 revised this gist
Apr 29, 2024 . 1 changed file with 6 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,13 +1,18 @@ # 投機的実行サイドチャネルハードウェア脆弱性 2024/04/29 更新 ## 影響を受けるプロセッサ Affected Processors: Transient Execution Attacks & Related Security... https://www.intel.com/content/www/us/en/developer/topic-technology/software-security-guidance/processors-affected-consolidated-product-cpu-model.html ## ソフトウェア・セキュリティ・ガイダンス Software Security Guidance from Intel https://www.intel.com/content/www/us/en/developer/topic-technology/software-security-guidance/overview.html ## システム管理者向けのガイダンス Guidance for System Administrators to Mitigate Transient Execution... -
tenpoku1000 revised this gist
Apr 27, 2024 . 1 changed file with 7 additions and 7 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -51,8 +51,8 @@ https://devblogs.microsoft.com/cppblog/spectre-mitigations-in-msvc/ ## (2) CVE-2017-5715 Variant 2 Spectre v2:Branch Target Injection Mitigating Spectre variant 2 with Retpoline on Windows - Microsoft Community Hub https://techcommunity.microsoft.com/t5/windows-os-platform-blog/mitigating-spectre-variant-2-with-retpoline-on-windows/ba-p/295618 Retpoline: A Branch Target Injection Mitigation https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/retpoline-branch-target-injection-mitigation.html @@ -65,8 +65,8 @@ https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability) Kernel page-table isolation - Wikipedia https://en.wikipedia.org/wiki/Kernel_page-table_isolation KVA Shadow: Mitigating Meltdown on Windows | MSRC Blog | Microsoft Security Response Center https://msrc.microsoft.com/blog/2018/03/kva-shadow-mitigating-meltdown-on-windows/ ## (3a) CVE-2018-3640 Variant 3a Spectre-NG v3a:Rogue System Register Read @@ -78,8 +78,8 @@ https://www.intel.com/content/www/us/en/developer/articles/technical/software-se Speculative Store Bypass / CVE-2018-3639 / INTEL-SA-00115 https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/speculative-store-bypass.html Analysis and mitigation of speculative store bypass (CVE-2018-3639) | MSRC Blog | Microsoft Security Response Center https://msrc.microsoft.com/blog/2018/05/analysis-and-mitigation-of-speculative-store-bypass-cve-2018-3639/ ## (5) CVE-2018-3615 Foreshadow, CVE-2018-3620 Foreshadow-OS, CVE-2018-3646 Foreshadow-VMM:L1 Terminal Fault(L1TF) @@ -138,7 +138,7 @@ https://t.co/6BqBFDPYrt / Twitter https://twitter.com/mhiramat/status/1007528520208211970 Cyberus Technology - Intel LazyFP vulnerability: Exploiting lazy FPU state switching https://web.archive.org/web/20230930185339/https://www.cyberus-technology.de/posts/intel-lazyfp-vulnerability/ x86/fpu: Hard-disable lazy FPU mode · torvalds/linux@ca6938a https://github.com/torvalds/linux/commit/ca6938a1cd8a1c5e861a99b67f84ac166fc2b9e7#diff-6a01d6e7c8d7d23cfa48026e616275e8 -
tenpoku1000 revised this gist
Apr 27, 2024 . 1 changed file with 2 additions and 2 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -81,15 +81,15 @@ https://www.intel.com/content/www/us/en/developer/articles/technical/software-se Analysis and mitigation of speculative store bypass (CVE-2018-3639) – Microsoft Security Response Center https://msrc-blog.microsoft.com/2018/05/21/analysis-and-mitigation-of-speculative-store-bypass-cve-2018-3639/ ## (5) CVE-2018-3615 Foreshadow, CVE-2018-3620 Foreshadow-OS, CVE-2018-3646 Foreshadow-VMM:L1 Terminal Fault(L1TF) Foreshadow - Wikipedia https://en.wikipedia.org/wiki/Foreshadow L1 Terminal Fault https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/intel-analysis-l1-terminal-fault.html ## (6) CVE-2018-12126 Fallout(MSBDS), CVE-2018-12127 RIDL(MLPDS), CVE-2018-12130 RIDL/ZombieLoad(MFBDS), CVE-2019-11091 RIDL(MDSUM):Microarchitectural Data Sampling Microarchitectural Data Sampling - Wikipedia https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling -
tenpoku1000 revised this gist
Apr 27, 2024 . 1 changed file with 17 additions and 12 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,7 +1,7 @@ # 投機的実行サイドチャネルハードウェア脆弱性 2024/04/27 更新 ## 影響を受けるプロセッサ @@ -41,15 +41,15 @@ https://www.intel.com/content/www/us/en/developer/articles/technical/software-se Indirect Branch Predictor Barrier https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/indirect-branch-predictor-barrier.html ## (1) CVE-2017-5753 Variant 1 Spectre v1: Bounds Check Bypass Analyzing Potential Bounds Check Bypass Vulnerabilities https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/analyzing-bounds-check-bypass-vulnerabilities.html Spectre mitigations in MSVC - C++ Team Blog https://devblogs.microsoft.com/cppblog/spectre-mitigations-in-msvc/ ## (2) CVE-2017-5715 Variant 2 Spectre v2:Branch Target Injection Mitigating Spectre variant 2 with Retpoline on Windows - Microsoft Tech Community https://techcommunity.microsoft.com/t5/windows-kernel-internals-blog/mitigating-spectre-variant-2-with-retpoline-on-windows/ba-p/295618 @@ -68,20 +68,20 @@ https://en.wikipedia.org/wiki/Kernel_page-table_isolation KVA Shadow: Mitigating Meltdown on Windows – Microsoft Security Response Center https://msrc-blog.microsoft.com/2018/03/23/kva-shadow-mitigating-meltdown-on-windows/ ## (3a) CVE-2018-3640 Variant 3a Spectre-NG v3a:Rogue System Register Read Rogue System Register Read / CVE-2018-3640 / INTEL-SA-00115 https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/rogue-system-register-read.html ## (4) CVE-2018-3639 Variant 4 Spectre-NG v4:Speculative Store Bypass Speculative Store Bypass / CVE-2018-3639 / INTEL-SA-00115 https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/speculative-store-bypass.html Analysis and mitigation of speculative store bypass (CVE-2018-3639) – Microsoft Security Response Center https://msrc-blog.microsoft.com/2018/05/21/analysis-and-mitigation-of-speculative-store-bypass-cve-2018-3639/ ## (5) CVE-2018-3615/CVE-2018-3620/CVE-2018-3646 L1 Terminal Fault(L1TF) Foreshadow - Wikipedia https://en.wikipedia.org/wiki/Foreshadow @@ -97,7 +97,7 @@ https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling Microarchitectural Data Sampling https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/intel-analysis-microarchitectural-data-sampling.html ## (7) CVE-2019-11135 RIDL/ZombieLoad v2:Transactional Asynchronous Abort(TAA) Intel® Transactional Synchronization Extensions (Intel® TSX)... https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/intel-tsx-asynchronous-abort.html @@ -118,7 +118,7 @@ https://www.intel.com/content/www/us/en/developer/articles/news/more-information CPUの新たな脆弱性 SPOILERの論文を読む - FPGA開発日記 https://msyksphinz.hatenablog.com/entry/2019/03/11/040000 ## (10) CVE-2018-3665 Spectre-NG:Lazy FPU Save/Restore INTEL-SA-00145 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html @@ -153,7 +153,7 @@ mov命令なんて知らなかったなー、みたいな気持ちになる。 全然メリットにならないというかむしろ遅くなったりするんですよねえ」 / Twitter https://twitter.com/takehiro_t/status/1158335098564956160 ## (11) CVE-2020-0549 RIDL/CacheOut/ZombieLoad:L1D Eviction Sampling(L1DES) CacheOut https://cacheoutattack.com/ @@ -164,15 +164,15 @@ https://www.intel.com/content/www/us/en/developer/articles/technical/software-se Processors Affected: L1D Eviction Sampling https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/resources/processors-affected-l1d-eviction-sampling.html ## (12) CVE-2020-0548 RIDL:Vector Register Sampling(VRS) Vector Register Sampling / CVE-2020-0548 , CVE 2020-8696 /... https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/vector-register-sampling.html Processors Affected: Vector Register Sampling https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/resources/processors-affected-vector-register-sampling.html ## (13) CVE-2020-0551 Load Value Injection(LVI) LVI: Hijacking Transient Execution with Load Value Injection https://lviattack.eu/ @@ -197,7 +197,7 @@ https://www.intel.com/content/www/us/en/developer/articles/technical/software-se Processors Affected: Snoop-assisted L1 Data Sampling https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/resources/processors-affected-snoop-assisted-l1d-sampling.html ## (15) CVE-2020-0543 CROSSTalk:Special Register Buffer Data Sampling(SRBDS) Special Register Buffer Data Sampling https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/special-register-buffer-data-sampling.html @@ -219,3 +219,8 @@ https://www.intel.com/content/www/us/en/developer/articles/technical/software-se INTEL-SA-00389 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html ## 参考資料 Transient execution CPU vulnerability - Wikipedia https://en.wikipedia.org/wiki/Transient_execution_CPU_vulnerability -
tenpoku1000 revised this gist
May 7, 2022 . 1 changed file with 43 additions and 43 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,61 +1,61 @@ # 投機的実行サイドチャネルハードウェア脆弱性 2022/05/07 更新 ## 影響を受けるプロセッサ Affected Processors: Transient Execution Attacks & Related Security... https://www.intel.com/content/www/us/en/developer/topic-technology/software-security-guidance/processors-affected-consolidated-product-cpu-model.html ## システム管理者向けのガイダンス Guidance for System Administrators to Mitigate Transient Execution... https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/best-practices/sysadmin-guidance-transient-execution-side-channel.html ## セキュア・コーディング Loading Microcode from the OS https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/secure-coding/loading-microcode-os.html Security Best Practices for Side Channel Resistance https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/secure-coding/security-best-practices-side-channel-resistance.html Guidelines for Mitigating Timing Side Channels Against Cryptographic... https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/secure-coding/mitigate-timing-side-channel-crypto-implementation.html How to Assess the Risk of Your Application https://www.intel.com/content/www/us/en/developer/articles/training/software-security-guidance/secure-coding/how-assess-risk-your-application.html ## 脆弱性対策として追加された CPUID/MSR CPUID Enumeration and Architectural MSRs https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/cpuid-enumeration-and-architectural-msrs.html Indirect Branch Restricted Speculation https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/indirect-branch-restricted-speculation.html Single Thread Indirect Branch Predictors https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/single-thread-indirect-branch-predictors.html Indirect Branch Predictor Barrier https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/indirect-branch-predictor-barrier.html ## (1) CVE-2017-5753 Variant 1 Bounds Check Bypass Analyzing Potential Bounds Check Bypass Vulnerabilities https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/analyzing-bounds-check-bypass-vulnerabilities.html Spectre mitigations in MSVC - C++ Team Blog https://devblogs.microsoft.com/cppblog/spectre-mitigations-in-msvc/ ## (2) CVE-2017-5715 Variant 2 Branch Target Injection Mitigating Spectre variant 2 with Retpoline on Windows - Microsoft Tech Community https://techcommunity.microsoft.com/t5/windows-kernel-internals-blog/mitigating-spectre-variant-2-with-retpoline-on-windows/ba-p/295618 Retpoline: A Branch Target Injection Mitigation https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/retpoline-branch-target-injection-mitigation.html ## (3) CVE-2017-5754 Variant 3 Meltdown:Rogue Data Cache Load @@ -65,55 +65,55 @@ https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability) Kernel page-table isolation - Wikipedia https://en.wikipedia.org/wiki/Kernel_page-table_isolation KVA Shadow: Mitigating Meltdown on Windows – Microsoft Security Response Center https://msrc-blog.microsoft.com/2018/03/23/kva-shadow-mitigating-meltdown-on-windows/ ## (3a) CVE-2018-3640 Variant 3a Rogue System Register Read Rogue System Register Read / CVE-2018-3640 / INTEL-SA-00115 https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/rogue-system-register-read.html ## (4) CVE-2018-3639 Variant 4 Speculative Store Bypass Speculative Store Bypass / CVE-2018-3639 / INTEL-SA-00115 https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/speculative-store-bypass.html Analysis and mitigation of speculative store bypass (CVE-2018-3639) – Microsoft Security Response Center https://msrc-blog.microsoft.com/2018/05/21/analysis-and-mitigation-of-speculative-store-bypass-cve-2018-3639/ ## (5) CVE-2018-3615/CVE-2018-3620/CVE-2018-3646 L1 Terminal Fault Foreshadow - Wikipedia https://en.wikipedia.org/wiki/Foreshadow L1 Terminal Fault https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/intel-analysis-l1-terminal-fault.html ## (6) CVE-2018-12126/CVE-2018-12127/CVE-2018-12130/CVE-2019-11091 Microarchitectural Data Sampling Microarchitectural Data Sampling - Wikipedia https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling Microarchitectural Data Sampling https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/intel-analysis-microarchitectural-data-sampling.html ## (7) CVE-2019-11135 Transactional Asynchronous Abort Intel® Transactional Synchronization Extensions (Intel® TSX)... https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/intel-tsx-asynchronous-abort.html ## (8) CVE-2019-1125 Spectre SWAPGS gadget vulnerability Speculative Behavior of SWAPGS and Segment Registers https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/speculative-behavior-swapgs-and-segment-registers.html ## (9) CVE-2019-0162 Spoiler Spoiler (security vulnerability) - Wikipedia https://en.wikipedia.org/wiki/Spoiler_(security_vulnerability) More Information on Spoiler https://www.intel.com/content/www/us/en/developer/articles/news/more-information-spoiler.html CPUの新たな脆弱性 SPOILERの論文を読む - FPGA開発日記 https://msyksphinz.hatenablog.com/entry/2019/03/11/040000 @@ -159,62 +159,62 @@ CacheOut https://cacheoutattack.com/ L1D Eviction Sampling / CVE-2020-0549 / INTEL-SA-00329 https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/l1d-eviction-sampling.html Processors Affected: L1D Eviction Sampling https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/resources/processors-affected-l1d-eviction-sampling.html ## (12) CVE-2020-0548 Vector Register Sampling Vector Register Sampling / CVE-2020-0548 , CVE 2020-8696 /... https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/vector-register-sampling.html Processors Affected: Vector Register Sampling https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/resources/processors-affected-vector-register-sampling.html ## (13) CVE-2020-0551 Load Value Injection LVI: Hijacking Transient Execution with Load Value Injection https://lviattack.eu/ An Optimized Mitigation Approach for Load Value Injection https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/best-practices/optimized-mitigation-approach-load-value-injection.html Load Value Injection https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/load-value-injection.html Processors Affected: Load Value Injection https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/resources/processors-affected-load-value-injection.html ## (14) CVE-2020-0550 Snoop-assisted L1 Data Sampling Snoop-assisted L1 Data Sampling / CVE-2020-0550 / INTEL-SA-00330 https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/snoop-assisted-l1-data-sampling.html Snoop-Assisted L1 Data Sampling https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/snoop-assisted-l1-data-sampling.html Processors Affected: Snoop-assisted L1 Data Sampling https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/resources/processors-affected-snoop-assisted-l1d-sampling.html ## (15) CVE-2020-0543 Special Register Buffer Data Sampling(SRBDS) Special Register Buffer Data Sampling https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/special-register-buffer-data-sampling.html SRBDS Mitigation Impact on Intel® Secure Key https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/best-practices/srbds-mitigation-impact-intel-secure-key.html Processors Affected: Special Register Buffer Data Sampling https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/resources/processors-affected-srbds.html ## (16) CVE-2020-8694/CVE-2020-8695 With Great Power comes Great Leakage(PLATYPUS) PLATYPUS: With Great Power comes Great Leakage https://platypusattack.com/ Running Average Power Limit Energy Reporting CVE-2020-8694,... https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/running-average-power-limit-energy-reporting.html INTEL-SA-00389 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html -
tenpoku1000 revised this gist
Sep 20, 2021 . 1 changed file with 46 additions and 45 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,7 +1,7 @@ # 投機的実行サイドチャネルハードウェア脆弱性 2021/09/21 更新 ## 影響を受けるプロセッサ @@ -10,41 +10,41 @@ https://software.intel.com/security-software-guidance/processors-affected-transi ## システム管理者向けのガイダンス Guidance for System Administrators to Mitigate Transient Execution... https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/best-practices/sysadmin-guidance-transient-execution-side-channel.html ## セキュア・コーディング Loading Microcode from the OS https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/secure-coding/loading-microcode-os.html Security Best Practices for Side Channel Resistance https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/secure-coding/security-best-practices-side-channel-resistance.html Guidelines for Mitigating Timing Side Channels Against Cryptographic... https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/secure-coding/mitigate-timing-side-channel-crypto-implementation.html How to Assess the Risk of Your Application https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/secure-coding/how-assess-risk-your-application.html ## 脆弱性対策として追加された CPUID/MSR CPUID Enumeration and Architectural MSRs https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/technical-documentation/cpuid-enumeration-and-architectural-msrs.html Indirect Branch Restricted Speculation https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/technical-documentation/indirect-branch-restricted-speculation.html Single Thread Indirect Branch Predictors https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/technical-documentation/single-thread-indirect-branch-predictors.html Indirect Branch Predictor Barrier https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/technical-documentation/indirect-branch-predictor-barrier.html ## (1) CVE-2017-5753 Variant 1 Bounds Check Bypass Analyzing Potential Bounds Check Bypass Vulnerabilities https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/technical-documentation/analyzing-bounds-check-bypass-vulnerabilities.html Spectre mitigations in MSVC | C++ Team Blog https://devblogs.microsoft.com/cppblog/spectre-mitigations-in-msvc/ @@ -55,7 +55,7 @@ Mitigating Spectre variant 2 with Retpoline on Windows - Microsoft Tech Communit https://techcommunity.microsoft.com/t5/windows-kernel-internals/mitigating-spectre-variant-2-with-retpoline-on-windows/ba-p/295618 Retpoline: A Branch Target Injection Mitigation https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/technical-documentation/retpoline-branch-target-injection-mitigation.html ## (3) CVE-2017-5754 Variant 3 Meltdown:Rogue Data Cache Load @@ -70,13 +70,13 @@ https://msrc-blog.microsoft.com/2018/03/23/kva-shadow-mitigating-meltdown-on-win ## (3a) CVE-2018-3640 Variant 3a Rogue System Register Read Rogue System Register Read / CVE-2018-3640 / INTEL-SA-00115 https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/advisory-guidance/rogue-system-register-read.html ## (4) CVE-2018-3639 Variant 4 Speculative Store Bypass Speculative Store Bypass / CVE-2018-3639 / INTEL-SA-00115 https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/advisory-guidance/speculative-store-bypass.html Analysis and mitigation of speculative store bypass (CVE-2018-3639) - Microsoft Security Response Center https://msrc-blog.microsoft.com/2018/05/21/analysis-and-mitigation-of-speculative-store-bypass-cve-2018-3639/ @@ -86,34 +86,34 @@ https://msrc-blog.microsoft.com/2018/05/21/analysis-and-mitigation-of-speculativ Foreshadow (security vulnerability) - Wikipedia https://en.wikipedia.org/wiki/Foreshadow_(security_vulnerability) L1 Terminal Fault https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/technical-documentation/intel-analysis-l1-terminal-fault.html ## (6) CVE-2018-12126/CVE-2018-12127/CVE-2018-12130/CVE-2019-11091 Microarchitectural Data Sampling Microarchitectural Data Sampling - Wikipedia https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling Microarchitectural Data Sampling (Fallout/Zombieload/RIDL) https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/technical-documentation/intel-analysis-microarchitectural-data-sampling.html ## (7) CVE-2019-11135 Transactional Asynchronous Abort Intel® Transactional Synchronization Extensions (Intel® TSX)... https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/technical-documentation/intel-tsx-asynchronous-abort.html ## (8) CVE-2019-1125 Spectre SWAPGS gadget vulnerability Speculative Behavior of SWAPGS and Segment Registers https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/technical-documentation/speculative-behavior-swapgs-and-segment-registers.html ## (9) CVE-2019-0162 Spoiler Spoiler (security vulnerability) - Wikipedia https://en.wikipedia.org/wiki/Spoiler_(security_vulnerability) More Information on Spoiler https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/bulletins/more-information-spoiler.html CPUの新たな脆弱性 SPOILERの論文を読む - FPGA開発日記 https://msyksphinz.hatenablog.com/entry/2019/03/11/040000 @@ -158,63 +158,64 @@ mov命令なんて知らなかったなー、みたいな気持ちになる。 CacheOut https://cacheoutattack.com/ L1D Eviction Sampling / CVE-2020-0549 / INTEL-SA-00329 https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/advisory-guidance/l1d-eviction-sampling.html Processors Affected: L1D Eviction Sampling https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/resources/processors-affected-l1d-eviction-sampling.html ## (12) CVE-2020-0548 Vector Register Sampling Vector Register Sampling / CVE-2020-0548 , CVE 2020-8696 /... https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/advisory-guidance/vector-register-sampling.html Processors Affected: Vector Register Sampling https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/resources/processors-affected-vector-register-sampling.html ## (13) CVE-2020-0551 Load Value Injection LVI: Hijacking Transient Execution with Load Value Injection https://lviattack.eu/ An Optimized Mitigation Approach for Load Value Injection https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/best-practices/optimized-mitigation-approach-load-value-injection.html Load Value Injection https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/technical-documentation/load-value-injection.html Processors Affected: Load Value Injection https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/resources/processors-affected-load-value-injection.html ## (14) CVE-2020-0550 Snoop-assisted L1 Data Sampling Snoop-assisted L1 Data Sampling / CVE-2020-0550 / INTEL-SA-00330 https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/advisory-guidance/snoop-assisted-l1-data-sampling.html Snoop-Assisted L1 Data Sampling https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/technical-documentation/snoop-assisted-l1-data-sampling.html Processors Affected: Snoop-assisted L1 Data Sampling https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/resources/processors-affected-snoop-assisted-l1d-sampling.html ## (15) CVE-2020-0543 Special Register Buffer Data Sampling(SRBDS) Special Register Buffer Data Sampling https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/technical-documentation/special-register-buffer-data-sampling.html SRBDS Mitigation Impact on Intel® Secure Key https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/best-practices/srbds-mitigation-impact-intel-secure-key.html Processors Affected: Special Register Buffer Data Sampling https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/resources/processors-affected-srbds.html ## (16) CVE-2020-8694/CVE-2020-8695 With Great Power comes Great Leakage(PLATYPUS) PLATYPUS: With Great Power comes Great Leakage https://platypusattack.com/ Running Average Power Limit Energy Reporting CVE-2020-8694,... https://software.intel.com/content/www/us/en/develop/articles/software-security-guidance/advisory-guidance/running-average-power-limit-energy-reporting.html INTEL-SA-00389 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html -
tenpoku1000 revised this gist
Apr 7, 2021 . 1 changed file with 6 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,7 +1,12 @@ # 投機的実行サイドチャネルハードウェア脆弱性 2021/04/08 更新 ## 影響を受けるプロセッサ Affected Processors: Transient Execution Attacks & Related Security Issues by CPU https://software.intel.com/security-software-guidance/processors-affected-transient-execution-attack-mitigation-product-cpu-model ## システム管理者向けのガイダンス -
tenpoku1000 revised this gist
Nov 11, 2020 . 1 changed file with 26 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,13 +1,27 @@ # 投機的実行サイドチャネルハードウェア脆弱性 2020/11/11 更新 ## システム管理者向けのガイダンス Guidance for System Administrators to Mitigate Transient Execution Side Channel Issues https://software.intel.com/security-software-guidance/best-practices/guidance-system-administrators-mitigate-transient-execution-side-channel-issues ## セキュア・コーディング Loading Microcode from the OS https://software.intel.com/security-software-guidance/secure-coding/loading-microcode-os Security Best Practices for Side Channel Resistance https://software.intel.com/security-software-guidance/secure-coding/security-best-practices-side-channel-resistance Guidelines for Mitigating Timing Side Channels Against Cryptographic Implementations https://software.intel.com/security-software-guidance/secure-coding/guidelines-mitigating-timing-side-channels-against-cryptographic-implementations How to Assess the Risk of Your Application https://software.intel.com/security-software-guidance/secure-coding/how-assess-risk-your-application ## 脆弱性対策として追加された CPUID/MSR CPUID Enumeration and Architectural MSRs @@ -188,3 +202,14 @@ https://software.intel.com/security-software-guidance/best-practices/srbds-mitig Processors Affected: Special Register Buffer Data Sampling https://software.intel.com/security-software-guidance/resources/processors-affected-special-register-buffer-data-sampling ## (16) CVE-2020-8694/CVE-2020-8695 With Great Power comes Great Leakage(PLATYPUS) PLATYPUS: With Great Power comes Great Leakage https://platypusattack.com/ Running Average Power Limit Energy Reporting https://software.intel.com/security-software-guidance/advisory-guidance/running-average-power-limit-energy-reporting INTEL-SA-00389 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html -
tenpoku1000 revised this gist
Sep 16, 2020 . 1 changed file with 10 additions and 10 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -70,25 +70,25 @@ https://en.wikipedia.org/wiki/Foreshadow_(security_vulnerability) L1 Terminal Fault | 01.org API https://software.intel.com/security-software-guidance/api-app/deep-dives/deep-dive-intel-analysis-l1-terminal-fault ## (6) CVE-2018-12126/CVE-2018-12127/CVE-2018-12130/CVE-2019-11091 Microarchitectural Data Sampling Microarchitectural Data Sampling - Wikipedia https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling Microarchitectural Data Sampling https://software.intel.com/security-software-guidance/deep-dives/deep-dive-intel-analysis-microarchitectural-data-sampling ## (7) CVE-2019-11135 Transactional Asynchronous Abort Intel® Transactional Synchronization Extensions (Intel® TSX) Asynchronous Abort https://software.intel.com/security-software-guidance/deep-dives/deep-dive-intel-transactional-synchronization-extensions-intel-tsx-asynchronous-abort ## (8) CVE-2019-1125 Spectre SWAPGS gadget vulnerability Speculative Behavior of SWAPGS and Segment Registers https://software.intel.com/security-software-guidance/deep-dives/deep-dive-intel-analysis-speculative-behavior-swapgs-and-segment-registers ## (9) CVE-2019-0162 Spoiler Spoiler (security vulnerability) - Wikipedia https://en.wikipedia.org/wiki/Spoiler_(security_vulnerability) @@ -99,7 +99,7 @@ https://software.intel.com/security-software-guidance/bulletins/more-information CPUの新たな脆弱性 SPOILERの論文を読む - FPGA開発日記 https://msyksphinz.hatenablog.com/entry/2019/03/11/040000 ## (10) CVE-2018-3665 Lazy FPU Save/Restore INTEL-SA-00145 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html @@ -134,7 +134,7 @@ mov命令なんて知らなかったなー、みたいな気持ちになる。 全然メリットにならないというかむしろ遅くなったりするんですよねえ」 / Twitter https://twitter.com/takehiro_t/status/1158335098564956160 ## (11) CVE-2020-0549 L1D Eviction Sampling CacheOut https://cacheoutattack.com/ @@ -145,15 +145,15 @@ https://software.intel.com/security-software-guidance/advisory-guidance/l1d-evic Processors Affected: L1D Eviction Sampling https://software.intel.com/security-software-guidance/resources/processors-affected-l1d-eviction-sampling ## (12) CVE-2020-0548 Vector Register Sampling Vector Register Sampling https://software.intel.com/security-software-guidance/advisory-guidance/vector-register-sampling Processors Affected: Vector Register Sampling https://software.intel.com/security-software-guidance/resources/processors-affected-vector-register-sampling ## (13) CVE-2020-0551 Load Value Injection LVI: Hijacking Transient Execution with Load Value Injection https://lviattack.eu/ @@ -167,7 +167,7 @@ https://software.intel.com/security-software-guidance/deep-dives/deep-dive-load- Processors Affected: Load Value Injection https://software.intel.com/security-software-guidance/resources/processors-affected-load-value-injection ## (14) CVE-2020-0550 Snoop-assisted L1 Data Sampling Snoop-assisted L1 Data Sampling https://software.intel.com/security-software-guidance/advisory-guidance/snoop-assisted-l1-data-sampling @@ -178,7 +178,7 @@ https://software.intel.com/security-software-guidance/deep-dives/deep-dive-snoop Processors Affected: Snoop-assisted L1 Data Sampling https://software.intel.com/security-software-guidance/resources/processors-affected-snoop-assisted-l1-data-sampling ## (15) CVE-2020-0543 Special Register Buffer Data Sampling(SRBDS) Special Register Buffer Data Sampling https://software.intel.com/security-software-guidance/deep-dives/deep-dive-special-register-buffer-data-sampling -
tenpoku1000 revised this gist
Sep 16, 2020 . 1 changed file with 0 additions and 3 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -188,6 +188,3 @@ https://software.intel.com/security-software-guidance/best-practices/srbds-mitig Processors Affected: Special Register Buffer Data Sampling https://software.intel.com/security-software-guidance/resources/processors-affected-special-register-buffer-data-sampling -
tenpoku1000 revised this gist
Sep 16, 2020 . 1 changed file with 45 additions and 43 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,29 +1,31 @@ # 投機的実行サイドチャネルハードウェア脆弱性 2020/09/16 更新 ## システム管理者向けのガイダンス Guidance for System Administrators to Mitigate Transient Execution Side Channel Issues https://software.intel.com/security-software-guidance/best-practices/guidance-system-administrators-mitigate-transient-execution-side-channel-issues ## 脆弱性対策として追加された CPUID/MSR CPUID Enumeration and Architectural MSRs https://software.intel.com/security-software-guidance/deep-dives/deep-dive-cpuid-enumeration-and-architectural-msrs Indirect Branch Restricted Speculation https://software.intel.com/security-software-guidance/deep-dives/deep-dive-indirect-branch-restricted-speculation Single Thread Indirect Branch Predictors https://software.intel.com/security-software-guidance/deep-dives/deep-dive-single-thread-indirect-branch-predictors Indirect Branch Predictor Barrier https://software.intel.com/security-software-guidance/deep-dives/deep-dive-indirect-branch-predictor-barrier ## (1) CVE-2017-5753 Variant 1 Bounds Check Bypass Analyzing Potential Bounds Check Bypass Vulnerabilities https://software.intel.com/security-software-guidance/deep-dives/deep-dive-analyzing-potential-bounds-check-bypass-vulnerabilities Spectre mitigations in MSVC | C++ Team Blog https://devblogs.microsoft.com/cppblog/spectre-mitigations-in-msvc/ @@ -33,8 +35,8 @@ https://devblogs.microsoft.com/cppblog/spectre-mitigations-in-msvc/ Mitigating Spectre variant 2 with Retpoline on Windows - Microsoft Tech Community - 295618 https://techcommunity.microsoft.com/t5/windows-kernel-internals/mitigating-spectre-variant-2-with-retpoline-on-windows/ba-p/295618 Retpoline: A Branch Target Injection Mitigation https://software.intel.com/security-software-guidance/deep-dives/deep-dive-retpoline-branch-target-injection-mitigation ## (3) CVE-2017-5754 Variant 3 Meltdown:Rogue Data Cache Load @@ -50,15 +52,12 @@ https://msrc-blog.microsoft.com/2018/03/23/kva-shadow-mitigating-meltdown-on-win ## (3a) CVE-2018-3640 Variant 3a Rogue System Register Read Rogue System Register Read https://software.intel.com/security-software-guidance/advisory-guidance/rogue-system-register-read ## (4) CVE-2018-3639 Variant 4 Speculative Store Bypass Speculative Store Bypass https://software.intel.com/security-software-guidance/advisory-guidance/speculative-store-bypass Analysis and mitigation of speculative store bypass (CVE-2018-3639) - Microsoft Security Response Center https://msrc-blog.microsoft.com/2018/05/21/analysis-and-mitigation-of-speculative-store-bypass-cve-2018-3639/ @@ -68,34 +67,34 @@ https://msrc-blog.microsoft.com/2018/05/21/analysis-and-mitigation-of-speculativ Foreshadow (security vulnerability) - Wikipedia https://en.wikipedia.org/wiki/Foreshadow_(security_vulnerability) L1 Terminal Fault | 01.org API https://software.intel.com/security-software-guidance/api-app/deep-dives/deep-dive-intel-analysis-l1-terminal-fault ## (5) CVE-2018-12126/CVE-2018-12127/CVE-2018-12130/CVE-2019-11091 Microarchitectural Data Sampling Microarchitectural Data Sampling - Wikipedia https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling Microarchitectural Data Sampling https://software.intel.com/security-software-guidance/deep-dives/deep-dive-intel-analysis-microarchitectural-data-sampling ## (6) CVE-2019-11135 Transactional Asynchronous Abort Intel® Transactional Synchronization Extensions (Intel® TSX) Asynchronous Abort https://software.intel.com/security-software-guidance/deep-dives/deep-dive-intel-transactional-synchronization-extensions-intel-tsx-asynchronous-abort ## (7) CVE-2019-1125 Spectre SWAPGS gadget vulnerability Speculative Behavior of SWAPGS and Segment Registers https://software.intel.com/security-software-guidance/deep-dives/deep-dive-intel-analysis-speculative-behavior-swapgs-and-segment-registers ## (8) CVE-2019-0162 Spoiler Spoiler (security vulnerability) - Wikipedia https://en.wikipedia.org/wiki/Spoiler_(security_vulnerability) More Information on Spoiler https://software.intel.com/security-software-guidance/bulletins/more-information-spoiler CPUの新たな脆弱性 SPOILERの論文を読む - FPGA開発日記 https://msyksphinz.hatenablog.com/entry/2019/03/11/040000 @@ -141,51 +140,54 @@ CacheOut https://cacheoutattack.com/ L1D Eviction Sampling https://software.intel.com/security-software-guidance/advisory-guidance/l1d-eviction-sampling Processors Affected: L1D Eviction Sampling https://software.intel.com/security-software-guidance/resources/processors-affected-l1d-eviction-sampling ## (11) CVE-2020-0548 Vector Register Sampling Vector Register Sampling https://software.intel.com/security-software-guidance/advisory-guidance/vector-register-sampling Processors Affected: Vector Register Sampling https://software.intel.com/security-software-guidance/resources/processors-affected-vector-register-sampling ## (12) CVE-2020-0551 Load Value Injection LVI: Hijacking Transient Execution with Load Value Injection https://lviattack.eu/ An Optimized Mitigation Approach for Load Value Injection https://software.intel.com/security-software-guidance/best-practices/optimized-mitigation-approach-load-value-injection Load Value Injection https://software.intel.com/security-software-guidance/deep-dives/deep-dive-load-value-injection Processors Affected: Load Value Injection https://software.intel.com/security-software-guidance/resources/processors-affected-load-value-injection ## (13) CVE-2020-0550 Snoop-assisted L1 Data Sampling Snoop-assisted L1 Data Sampling https://software.intel.com/security-software-guidance/advisory-guidance/snoop-assisted-l1-data-sampling Snoop-assisted L1 Data Sampling https://software.intel.com/security-software-guidance/deep-dives/deep-dive-snoop-assisted-l1-data-sampling Processors Affected: Snoop-assisted L1 Data Sampling https://software.intel.com/security-software-guidance/resources/processors-affected-snoop-assisted-l1-data-sampling ## (14) CVE-2020-0543 Special Register Buffer Data Sampling(SRBDS) Special Register Buffer Data Sampling https://software.intel.com/security-software-guidance/deep-dives/deep-dive-special-register-buffer-data-sampling SRBDS Mitigation Impact on Intel® Secure Key https://software.intel.com/security-software-guidance/best-practices/srbds-mitigation-impact-intel-secure-key Processors Affected: Special Register Buffer Data Sampling https://software.intel.com/security-software-guidance/resources/processors-affected-special-register-buffer-data-sampling Processors Affected: Special Register Buffer Data Sampling https://software.intel.com/security-software-guidance/resources/processors-affected-special-register-buffer-data-sampling -
tenpoku1000 revised this gist
Jul 15, 2020 . 1 changed file with 3 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -52,6 +52,9 @@ https://msrc-blog.microsoft.com/2018/03/23/kva-shadow-mitigating-meltdown-on-win Rogue System Register Read https://software.intel.com/security-software-guidance/software-guidance/rogue-system-register-read Instructions Affected by Rogue System Register Read https://software.intel.com/security-software-guidance/insights/instructions-affected-rogue-system-register-read ## (4) CVE-2018-3639 Variant 4 Speculative Store Bypass Speculative Store Bypass -
tenpoku1000 revised this gist
Jun 11, 2020 . 1 changed file with 16 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,6 +1,11 @@ # 投機的実行サイドチャネルハードウェア脆弱性 ## システム管理者向けのガイダンス Guidance for System Administrators to Mitigate Transient Execution Side Channel Issues https://software.intel.com/security-software-guidance/insights/guidance-system-administrators-mitigate-transient-execution-side-channel-issues ## 脆弱性対策として追加された CPUID/MSR Deep Dive: CPUID Enumeration and Architectural MSRs @@ -170,3 +175,14 @@ https://software.intel.com/security-software-guidance/insights/deep-dive-snoop-a Processors Affected: Snoop-assisted L1 Data Sampling https://software.intel.com/security-software-guidance/insights/processors-affected-snoop-assisted-l1-data-sampling ## (14) CVE-2020-0543 Special Register Buffer Data Sampling(SRBDS) Deep Dive: Special Register Buffer Data Sampling https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling SRBDS Mitigation Impact on Intel® Secure Key https://software.intel.com/security-software-guidance/insights/srbds-mitigation-impact-intel-secure-key Processors Affected: Special Register Buffer Data Sampling https://software.intel.com/security-software-guidance/insights/processors-affected-special-register-buffer-data-sampling -
tenpoku1000 revised this gist
Mar 12, 2020 . 1 changed file with 11 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -159,3 +159,14 @@ https://software.intel.com/security-software-guidance/insights/deep-dive-load-va Processors Affected: Load Value Injection https://software.intel.com/security-software-guidance/insights/processors-affected-load-value-injection ## (13) CVE-2020-0550 Snoop-assisted L1 Data Sampling Snoop-assisted L1 Data Sampling https://software.intel.com/security-software-guidance/software-guidance/snoop-assisted-l1-data-sampling Deep Dive: Snoop-assisted L1 Data Sampling https://software.intel.com/security-software-guidance/insights/deep-dive-snoop-assisted-l1-data-sampling Processors Affected: Snoop-assisted L1 Data Sampling https://software.intel.com/security-software-guidance/insights/processors-affected-snoop-assisted-l1-data-sampling -
tenpoku1000 revised this gist
Mar 11, 2020 . 1 changed file with 14 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -145,3 +145,17 @@ https://software.intel.com/security-software-guidance/software-guidance/vector-r Processors Affected: Vector Register Sampling https://software.intel.com/security-software-guidance/insights/processors-affected-vector-register-sampling ## (12) CVE-2020-0551 Load Value Injection LVI: Hijacking Transient Execution with Load Value Injection https://lviattack.eu/ An Optimized Mitigation Approach for Load Value Injection https://software.intel.com/security-software-guidance/insights/optimized-mitigation-approach-load-value-injection Deep Dive: Load Value Injection https://software.intel.com/security-software-guidance/insights/deep-dive-load-value-injection Processors Affected: Load Value Injection https://software.intel.com/security-software-guidance/insights/processors-affected-load-value-injection -
tenpoku1000 revised this gist
Jan 28, 2020 . 1 changed file with 19 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -126,3 +126,22 @@ mov命令なんて知らなかったなー、みたいな気持ちになる。 「@uchan_nos このせいで最近はFPU lazy context switchとかが 全然メリットにならないというかむしろ遅くなったりするんですよねえ」 / Twitter https://twitter.com/takehiro_t/status/1158335098564956160 ## (10) CVE-2020-0549 L1D Eviction Sampling CacheOut https://cacheoutattack.com/ L1D Eviction Sampling https://software.intel.com/security-software-guidance/software-guidance/l1d-eviction-sampling Processors Affected: L1D Eviction Sampling https://software.intel.com/security-software-guidance/insights/processors-affected-l1d-eviction-sampling ## (11) CVE-2020-0548 Vector Register Sampling Vector Register Sampling https://software.intel.com/security-software-guidance/software-guidance/vector-register-sampling Processors Affected: Vector Register Sampling https://software.intel.com/security-software-guidance/insights/processors-affected-vector-register-sampling -
tenpoku1000 revised this gist
Jan 20, 2020 . 1 changed file with 6 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -31,7 +31,7 @@ https://techcommunity.microsoft.com/t5/windows-kernel-internals/mitigating-spect Deep Dive: Retpoline: A Branch Target Injection Mitigation https://software.intel.com/security-software-guidance/insights/deep-dive-retpoline-branch-target-injection-mitigation ## (3) CVE-2017-5754 Variant 3 Meltdown:Rogue Data Cache Load Meltdown (security vulnerability) - Wikipedia https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability) @@ -42,6 +42,11 @@ https://en.wikipedia.org/wiki/Kernel_page-table_isolation KVA Shadow: Mitigating Meltdown on Windows - Microsoft Security Response Center https://msrc-blog.microsoft.com/2018/03/23/kva-shadow-mitigating-meltdown-on-windows/ ## (3a) CVE-2018-3640 Variant 3a Rogue System Register Read Rogue System Register Read https://software.intel.com/security-software-guidance/software-guidance/rogue-system-register-read ## (4) CVE-2018-3639 Variant 4 Speculative Store Bypass Speculative Store Bypass -
tenpoku1000 revised this gist
Jan 19, 2020 . 1 changed file with 45 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -76,3 +76,48 @@ https://software.intel.com/security-software-guidance/insights/deep-dive-intel-t Deep Dive: Intel Analysis of Speculative Behavior of SWAPGS and Segment Registers https://software.intel.com/security-software-guidance/insights/deep-dive-intel-analysis-speculative-behavior-swapgs-and-segment-registers ## (8) CVE-2019-0162 Spoiler Spoiler (security vulnerability) - Wikipedia https://en.wikipedia.org/wiki/Spoiler_(security_vulnerability) More Information on Spoiler https://software.intel.com/security-software-guidance/insights/more-information-spoiler CPUの新たな脆弱性 SPOILERの論文を読む - FPGA開発日記 https://msyksphinz.hatenablog.com/entry/2019/03/11/040000 ## (9) CVE-2018-3665 Lazy FPU Save/Restore INTEL-SA-00145 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html Lazy FPU Save/Restore (CVE-2018-3665) - Red Hat Customer Portal https://access.redhat.com/ja/solutions/3489521 NetBSD 8.0がSpectre V2/V4、Meltdown、Lazy FPUの軽減などを提供 https://www.infoq.com/jp/news/2018/07/netbsd-8-released/ まさみさん⋈語りたいさんはTwitterを使っています: 「Linuxは3.7以降ならeagerfpu=onのブートパラメタで回避可能だし、 4.6以降はデフォルトでeagerfpu有効。 lazyfpuは殆どパフォーマンス的に意味がなかったらしい。 https://t.co/6BqBFDPYrt コミット。 https://t.co/amgTkvEo9d」 / Twitter https://twitter.com/mhiramat/status/1007528520208211970 Cyberus Technology - Intel LazyFP vulnerability: Exploiting lazy FPU state switching https://blog.cyberus-technology.de/posts/2018-06-06-intel-lazyfp-vulnerability.html x86/fpu: Hard-disable lazy FPU mode · torvalds/linux@ca6938a https://github.com/torvalds/linux/commit/ca6938a1cd8a1c5e861a99b67f84ac166fc2b9e7#diff-6a01d6e7c8d7d23cfa48026e616275e8 うー@技術書典8Day1う31さんはTwitterを使っています: 「逆アセンブルして覗いてみると、AVXレジスタを用いた mov命令なんて知らなかったなー、みたいな気持ちになる。」 / Twitter https://twitter.com/uchan_nos/status/1158192868080513024 とみながたけひろさんはTwitterを使っています: 「@uchan_nos このせいで最近はFPU lazy context switchとかが 全然メリットにならないというかむしろ遅くなったりするんですよねえ」 / Twitter https://twitter.com/takehiro_t/status/1158335098564956160 -
tenpoku1000 created this gist
Jan 19, 2020 .There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -0,0 +1,78 @@ # 投機的実行サイドチャネルハードウェア脆弱性 ## 脆弱性対策として追加された CPUID/MSR Deep Dive: CPUID Enumeration and Architectural MSRs https://software.intel.com/security-software-guidance/insights/deep-dive-cpuid-enumeration-and-architectural-msrs Deep Dive: Indirect Branch Restricted Speculation https://software.intel.com/security-software-guidance/insights/deep-dive-indirect-branch-restricted-speculation Deep Dive: Single Thread Indirect Branch Predictors https://software.intel.com/security-software-guidance/insights/deep-dive-single-thread-indirect-branch-predictors Deep Dive: Indirect Branch Predictor Barrier https://software.intel.com/security-software-guidance/insights/deep-dive-indirect-branch-predictor-barrier ## (1) CVE-2017-5753 Variant 1 Bounds Check Bypass Deep Dive: Analyzing Potential Bounds Check Bypass Vulnerabilities https://software.intel.com/security-software-guidance/insights/deep-dive-analyzing-potential-bounds-check-bypass-vulnerabilities Spectre mitigations in MSVC | C++ Team Blog https://devblogs.microsoft.com/cppblog/spectre-mitigations-in-msvc/ ## (2) CVE-2017-5715 Variant 2 Branch Target Injection Mitigating Spectre variant 2 with Retpoline on Windows - Microsoft Tech Community - 295618 https://techcommunity.microsoft.com/t5/windows-kernel-internals/mitigating-spectre-variant-2-with-retpoline-on-windows/ba-p/295618 Deep Dive: Retpoline: A Branch Target Injection Mitigation https://software.intel.com/security-software-guidance/insights/deep-dive-retpoline-branch-target-injection-mitigation ## (3) CVE-2017-5754 Variant 3 Meltdown:rogue data cache load Meltdown (security vulnerability) - Wikipedia https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability) Kernel page-table isolation - Wikipedia https://en.wikipedia.org/wiki/Kernel_page-table_isolation KVA Shadow: Mitigating Meltdown on Windows - Microsoft Security Response Center https://msrc-blog.microsoft.com/2018/03/23/kva-shadow-mitigating-meltdown-on-windows/ ## (4) CVE-2018-3639 Variant 4 Speculative Store Bypass Speculative Store Bypass https://software.intel.com/security-software-guidance/software-guidance/speculative-store-bypass Analysis and mitigation of speculative store bypass (CVE-2018-3639) - Microsoft Security Response Center https://msrc-blog.microsoft.com/2018/05/21/analysis-and-mitigation-of-speculative-store-bypass-cve-2018-3639/ ## (5) CVE-2018-3615/CVE-2018-3620/CVE-2018-3646 L1 Terminal Fault Foreshadow (security vulnerability) - Wikipedia https://en.wikipedia.org/wiki/Foreshadow_(security_vulnerability) Deep Dive: Intel Analysis of L1 Terminal Fault | 01.org API https://software.intel.com/security-software-guidance/api-app/insights/deep-dive-intel-analysis-l1-terminal-fault ## (5) CVE-2018-12126/CVE-2018-12127/CVE-2018-12130/CVE-2019-11091 Microarchitectural Data Sampling Microarchitectural Data Sampling - Wikipedia https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling Deep Dive: Intel Analysis of Microarchitectural Data Sampling https://software.intel.com/security-software-guidance/insights/deep-dive-intel-analysis-microarchitectural-data-sampling ## (6) CVE-2019-11135 Transactional Asynchronous Abort Deep Dive: Intel® Transactional Synchronization Extensions (Intel® TSX) Asynchronous Abort https://software.intel.com/security-software-guidance/insights/deep-dive-intel-transactional-synchronization-extensions-intel-tsx-asynchronous-abort ## (7) CVE-2019-1125 Spectre SWAPGS gadget vulnerability Deep Dive: Intel Analysis of Speculative Behavior of SWAPGS and Segment Registers https://software.intel.com/security-software-guidance/insights/deep-dive-intel-analysis-speculative-behavior-swapgs-and-segment-registers