$150K awarded for L1TF Reloaded exploit that bypasses cloud mitigations

Researchers earned $150K for “L1TF Reloaded,” combining L1TF and half-Spectre to leak VM memory from public clouds despite mitigations.

Security Affairs
Find out how vulnerable your GNU/Linux system is to those fancy modern CPU bugs: /sys/devices/system/cpu/vulnerabilities/ #spectre #meltdown #l1tf
Disable SMT/Hyperthreading in all Intel BIOSes: https://marc.info/?l=openbsd-tech&m=153504937925732&w=2 #OpenBSD #L1TF
'Disable SMT/Hyperthreading in all Intel BIOSes' - MARC

There's some fire in #OpenBSD's commit message to address Intel's #L1TF screwup

"""(3) stuffing the L1D cache with fresh data and expiring old content. This stuffing loop is complicated and interesting, no details on the mitigation have been released by Intel so Mike and I studied other systems for inspiration. Replacement algorithm for the L1D is described in the tlbleed paper."""

https://undeadly.org/cgi?action=article;sid=20180821191906

Fix for L1TF issue in Intel CPUs committed

L1TF - L1 Terminal Fault Attack, la última vulnerabilidad en los procesadores Intel - ochobitshacenunbyte

Hablamos de la noticia de la nueva vulnerabilidad L1TF - L1 Terminal Fault Attack, que afecta a los procesadores de la compañía Intel x86

ochobitshacenunbyte

So I'm waiting until Intel's 9th Gen announcement to build my new PC, but things like #L1TF/#Foreshadow strongly make me consider #AMD... well, those and the fact that I can get 16 cores for $899.

https://www.bleepingcomputer.com/news/security/researchers-disclose-new-foreshadow-l1tf-vulnerabilities-affecting-intel-cpus/

That being said, #Intel said they patched this one with 0 performance hit so I guess it shouldn't be that much of a dealbreaker. Choices, choices...

Researchers Disclose New Foreshadow (L1TF) Vulnerabilities Affecting Intel CPUs

Academics and private sector researchers have revealed details today about three new vulnerabilities affecting Intel CPUs.

RT @[email protected] Theo de Raadt on the impact of the Intel #Foreshadow #L1TF on #OpenBSD. “We asked repeatedly, but Intel provided no advance notice. We did not even receive replies to our requests for dialogue. On a side note, AMD cpus are not vulnerable to this problem.”

https://marc.info/?l=openbsd-tech&m=153431475429367&w=2

'CVE-2018-3615, CVE-2018-3620, CVE-2018-3646' - MARC

So, #L1TF is kinda the "hyperthreading is dead" one... VMware introduces a new "ESXi Side-Channel-Aware Scheduler".
Quote: "Currently, this scheduler provides the Hyper-Threading-aware mitigation by scheduling on only one Hyper-Thread of a Hyper-Thread-enabled core. As described in more detail below, careful capacity planning is required prior to enabling the ESXi Side-Channel-Aware Scheduler as it could have a performance impact for enterprise applications."

https://kb.vmware.com/s/article/55767

VMware Knowledge Base

Looks like we'll be planning for the next round of VMware updates due to #L1TF tomorrow: https://www.vmware.com/security/advisories/VMSA-2018-0020.html

"vCenter Server, ESXi, Workstation, and Fusion updates include Hypervisor-Specific Mitigations for L1 Terminal Fault - VMM. This issue may allow a malicious VM running on a given CPU core to effectively read the hypervisor’s or another VM’s privileged information that resides sequentially or concurrently in the same core’s L1 Data cache."

#infosec
VMSA-2018-0020

VMware vSphere, Workstation, and Fusion updates enable Hypervisor-Specific Mitigations for L1 Terminal Fault - VMM vulnerability.