Recently, a worrisome execution hole was found in Intel’s processors named ‘Spoiler’. The level of vulnerability is similar to Spectre, another flaw affecting modern microprocessors, but works differently.
Researchers from Worcester Polytechnic Institute in Massachusetts and the University of Lübeck in Germany says that the root cause for Spoiler is a vulnerability in the address speculation of Intel’s proprietary implementation of the memory subsystem. That straightaway leaks timing behavior due to physical address conflicts.
Therefore, existing spectre mitigations would not interfere with Spoiler.
Researchers say that this vulnerability cannot be resolved through any existing measures, but require a substantial amount of redesigning work.
The security flaw puts danger mark on all the Intel Core processors from the first generation onwards.
An Intel spokesperson recently stated that Intel received notice of this research, and they believe the software can be protected at the present situation by employing side channel safe software development practices.
He also appreciated the security researchers for their efforts and added that protecting customers and their data is always the primary priority for the company