[sf-lug] Notification about ZombieLoad Attack vulnerabilities

Bobbie Sellers bliss-sf4ever at dslextreme.com
Wed May 15 13:11:25 PDT 2019



On 5/15/19 8:44 AM, aaronco36 wrote:
> For those of you who aren't already aware of this, there was posted 
> within the last several days the discovery of more critical 
> vulnerabilities in Intel-based processors *besides* the previous 
> infamous Meltdown, Spectre, and Foreshadow vulnerabilities.
>
>> From the ZombieLoad Attack website [1]:
> ~~~~~~~~~~~~~~~ quoting ~~~~~~~~~~~~~~~~~~~~
> Watch out! Your processor resurrects your private browsing-history and 
> other sensitive data.
>
> After Meltdown, Spectre, and Foreshadow, we discovered more critical 
> vulnerabilities in modern processors. The ZombieLoad attack allows 
> stealing sensitive data and keys while the computer accesses them.
>
> While programs normally only see their own data, a malicious program 
> can exploit the fill buffers to get hold of secrets currently 
> processed by other running programs. These secrets can be user-level 
> secrets, such as browser history, website content, user keys, and 
> passwords, or system-level secrets, such as disk encryption keys.
>
> The attack does not only work on personal computers but can also be 
> exploited in the cloud.
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>
> Among other good sources of information about the ZombieLoad Attack 
> currently making the rounds, also see references [2] thru [6].
> SJVN even mentioned yesterday in reference [7] how the ZombieLand 
> Attack vulnerability can affect Linux systems.
>
> -A
>
> ================================
> References
> ================================
> [1]https://zombieloadattack.com/
> [2]https://techcrunch.com/2019/05/14/zombieload-flaw-intel-processors/
> [3]https://www.zdnet.com/article/intel-cpus-impacted-by-new-zombieload-side-channel-attack/ 
>
> [4]https://gizmodo.com/what-to-do-about-the-new-intel-chip-flaw-1834759126 
>
> [5]https://www.reddit.com/r/linux/comments/booowk/zombieload_cross_privilegeboundary_data_leakage_a/ 
>
> [6]https://9to5mac.com/2019/05/14/intel-zombieload-vulnerability-mac/
> [7]https://www.zdnet.com/article/linux-vs-zombieload/
> ================================
>
> aaronco36 at sdf.org
> ---------------------
>

         First thank you Aaron.  I have re-posted to several mailing 
lists and a Usenet
newsgroup but here is another URL that was referred to as cute.  It does 
not seem to be a fully
comprehensive list as it was said to be.  The answers to the questions 
are cute though.
<https://cpu.fail/>

     Bobbie Sellers
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://linuxmafia.com/pipermail/sf-lug/attachments/20190515/f6c8ff35/attachment.html>


More information about the sf-lug mailing list