An buga kayan aikin don ɓata microcode na Intel

Rukunin masu binciken tsaro daga ƙungiyar uCode sun buga lambar tushe don lalata microcode na Intel. Dabarar Buɗewa ta Red, wanda masu bincike iri ɗaya suka haɓaka a cikin 2020, ana iya amfani da su don cire ɓoyayyen microcode. Ƙarfin da aka tsara na yanke microcode yana ba ku damar bincika tsarin ciki na microcode da hanyoyin aiwatar da umarnin injin x86. Bugu da ƙari, masu binciken sun maido da tsarin sabunta microcode, ɓoyayyen algorithm da maɓallin da aka yi amfani da shi don kare microcode (RC4).

Don tantance maɓallin ɓoyayyen da aka yi amfani da shi, an yi amfani da rauni a cikin Intel TXE, wanda tare da shi suka sami damar kunna yanayin lalata ba tare da izini ba, wanda masu binciken suka sanya wa suna "Red Buše." A cikin yanayin gyara kuskure, mun sami damar zazzage juji tare da microcode mai aiki kai tsaye daga CPU kuma mu cire algorithm da maɓallai daga ciki.

Kayan aikin kayan aiki kawai yana ba ku damar ɓata microcode, amma baya ƙyale ku canza shi, tunda an kuma tabbatar da amincin microcode ta amfani da sa hannu na dijital bisa ga RSA algorithm. Hanyar ta shafi Intel Gemini Lake na'urori masu sarrafawa bisa ga microarchitecture na Goldmont Plus da Intel Apolo Lake dangane da microarchitecture na Goldmont.

source: budenet.ru

Add a comment