Update
Jan 3, 2018
Posting this on the gaming side as there is still an active PC hardware community who are still building/upgrading their computers to Kaby/Coffee/Ryen/Threadripper/NVME/ Geforce etc...
The gist of it:
So there is big news going on about a security exploit that is currently embargoed to allow companies like Amazon, Google, Apple, etc. to patch. Users got wind of this when noticing peculiar updates to the Linux kernel which are being tested. Because of the embargo this have been worked out by looking at the fix being tested. The issue is that there is a hardware security bug that allows an attacker in user space to read the kernel's memory. This is huge especially in virtualized environments (Amazon EC2, MS Azure, Google Compute) and can only be fixed via software.
This security bug and the particular exploit is embargoed. So far we know it affects all Intel CPU's from the last decade until now running Windows, Linux, Unix, BSD, MacOS and may affect AMD** in software. So far we know that Intel's CPU's that use speculative execution ( it's a feature™ ) can be exploited in such a way that allow an unprivileged user to circumvent kernel memory protection. We'll know more soon....
**AMD CPU's so far are not as affected according to the Linux discussion for now as the issue is being isolated to Intel CPU's.. This can change and so far on the mailing list people are approaching on the side of caution for all x86 CPUs until testing and full disclosure of the exploit(s).
The register is reporting in their test a worst case of 23% on Intel though the test is not exhaustiveLINK
Some are bringing up the Intel CEO because he sold all his shares but the minimum required amount he must have during his tenure. There is no proof this is related. LINK
Jan 3, 2018
- Exploits have been undisclosed: Meltdown and Spectre. First discovered by University of Graz in Austria, German security firm Cerberus Security, and Google's Project Zero a year ago.
LINK
Meltdown
The first problem, Meltdown, is the one that stimulated the flurry of operating system patches. It uses speculative execution to leak kernel data to regular user programs....
The researchers say they haven't been able to perform the same kind of kernel memory-based speculation on AMD or ARM processors, though they hold out some hope that some way of using this speculation offensively will be developed. While AMD has stated specifically that its chips don't speculate around kernel addresses in this way, ARM has said that some of its designs may be vulnerable, and ARM employees have contributed patches to Linux to protect against Meltdown.
For systems with Intel chips, the impact is quite severe, as potentially any kernel memory can be read by user programs...
Spectre
Owners of AMD and ARM systems shouldn't rest easy, though, and that's thanks to Spectre. Spectre is a more general attack, based on a wider range of speculative execution features. The paper describes using speculation around, for example, array bounds checks and branches instructions to leak information, with proof-of-concept attacks being successful on AMD, ARM, and Intel systems.
In the immediate term, it looks like most systems will shortly have patches for Meltdown. At least for Linux and Windows, these patches allow end-users to opt out if they would prefer. The most vulnerable users are probably cloud service providers; Meltdown and Spectre can both in principle be used to further attacks against hypervisors, making it easier for malicious user to break out of their virtual machines.
- Damage Control: Intel accuses media of being inaccurate and says saying it's not just it's own processors claiming the "processors are susceptible to the exploit" without naming them. (Press Release.)
- The UK's National Cyber Security Centre (NCSC) says this is a problem with Intel processors specifically. LINK
- ARM confirmed that Cortex-A processors are affected LINK
- Some are reporting up to 50% decline in performance. ArsTechnica
However, their source for this claim is claiming 34% on Ivy Bridge. @grsecurity - Macs have been patched with more to come in 10.13.3 according to Alex Ionescu
- PHD student shows off a simple proof of concept exploit. LINK
Posting this on the gaming side as there is still an active PC hardware community who are still building/upgrading their computers to Kaby/Coffee/Ryen/Threadripper/NVME/ Geforce etc...
The gist of it:
So there is big news going on about a security exploit that is currently embargoed to allow companies like Amazon, Google, Apple, etc. to patch. Users got wind of this when noticing peculiar updates to the Linux kernel which are being tested. Because of the embargo this have been worked out by looking at the fix being tested. The issue is that there is a hardware security bug that allows an attacker in user space to read the kernel's memory. This is huge especially in virtualized environments (Amazon EC2, MS Azure, Google Compute) and can only be fixed via software.
This security bug and the particular exploit is embargoed. So far we know it affects all Intel CPU's from the last decade until now running Windows, Linux, Unix, BSD, MacOS and may affect AMD** in software. So far we know that Intel's CPU's that use speculative execution ( it's a feature™ ) can be exploited in such a way that allow an unprivileged user to circumvent kernel memory protection. We'll know more soon....
**AMD CPU's so far are not as affected according to the Linux discussion for now as the issue is being isolated to Intel CPU's.. This can change and so far on the mailing list people are approaching on the side of caution for all x86 CPUs until testing and full disclosure of the exploit(s).
AMD processors are not subject to the types of attacks that the kernel
page table isolation feature protects against....
if (c->x86_vendor != X86_VENDOR_AMD)
+ setup_force_cpu_bug(X86_BUG_CPU_INSECURE);
The register is reporting in their test a worst case of 23% on Intel though the test is not exhaustiveLINK
Some are bringing up the Intel CEO because he sold all his shares but the minimum required amount he must have during his tenure. There is no proof this is related. LINK