Conversation
Spectre-class CPU bugs on Intel CPUs

Courtesy of Intel, here's periodic reminder, that superscalar, out-of-order CPUs will leak secret data. Last non-broken CPU from Intel is Pentium MMX and probably some Atom models.

+++ b/Documentation/admin-guide/hw-vuln/indirect-target-selection.rst
@@ -0,0 +1,168 @@
+.. SPDX-License-Identifier: GPL-2.0
+
+Indirect Target Selection (ITS)
+===============================
+
+ITS is a vulnerability in some Intel CPUs that support Enhanced IBRS and were
+released before Alder Lake. ITS may allow an attacker to control the predictio\
n
+of indirect branches and RETs located in the lower half of a cacheline.
+
+ITS is assigned CVE-2024-28956 with a CVSS score of 4.7 (Medium).
1
0
3

@pavel
> last non-broken CPU is Pentium MMX

We must go back! The cult of Penitum shall rise worldwide!

2
0
1
@ozzelot@mstdn.social @pavel@social.kernel.org
Phe-ew, my dual Pentium Pro Siemens-Nixdorf workstation seems secure. Might need vacuuming though… like literally. And I hope I won't find some weird insectoid lifeforms inside 😂
1
0
1
@ozzelot Yeah, it may be good not to drop support for Pentium from kenrel/libc/etc. Plus, free Pentium implementations should now be possible.
1
0
1
@m0xEE @ozzelot Umm. dual PPro sounds like a nice toy, but I believe it may already be affected by speculation problems. :-)
1
0
2
@pavel@social.kernel.org @ozzelot@mstdn.social
Ha-ha, true — it most likely is, just joking. It has other kinks to iron out — for some reasons, the distros I tried, even from "its era" fail to boot on it. NT it came with works fine though — so it's not hardware. Never dug deeper into it.
In any case it, it probably has too little RAM to be used for anything meaningful today — and that is coming from the one who hosts this instance on a 20 y.o. PowerPC MacMini 😅
More RAM for this thing… would be a real challenge to find in working condition, if at all possible.
0
0
1