Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Kernel panic! What are Meltdown and Spectre, the bugs affecting nearly every computer and device?
Tech Crunch ^ | 1/3/18 | Devin Coldewey

Posted on 01/03/2018 6:43:24 PM PST by markomalley

If you’re confused by the avalanche of early reports, denials, and conflicting statements about the massive security issues announced today, don’t worry — you’re far from the only one. Here’s what you need to know about Meltdown and Spectre, the two huge bugs that affect practically every computer and device out there.

What are these flaws?

Short answer: Bugs at a fundamental level that allow critical information stored deep inside computer systems to be exposed.


Security researchers released official documentation — complete with nicknames and logos —  of two major flaws found in nearly all modern central processing units, or CPUs.

It’s not a physical problem with the CPUs themselves, or a plain software bug you might find in an application like Word or Chrome. It’s in between, at the level of the processors’ “architectures,” the way all the millions of transistors and logic units work together to carry out instructions.

In modern architectures, there are inviolable spaces where data passes through in raw, unencrypted form, such as inside the kernel, the most central software unit in the architecture, or in system memory carefully set aside from other applications. This data has powerful protections to prevent it from being interfered with or even observed by other processes and applications.

Meltdown and Spectre are two techniques researchers have discovered that circumvent those protections, exposing nearly any data the computer processes, such as passwords, proprietary information, or encrypted communications.

Meltdown affects Intel processors, and works by breaking through the barrier that prevents applications from accessing arbitrary locations in kernel memory. Segregating and protecting memory spaces prevents applications from accidentally interfering with one another’s data, or malicious software from being able to see and modify it at will. Meltdown makes this fundamental process fundamentally unreliable.

Spectre affects Intel, AMD, and ARM processors, broadening its reach to include mobile phones, embedded devices, and pretty much anything with a chip in it. Which, of course, is everything from thermostats to baby monitors now.

It works differently from Meltdown; Spectre essentially tricks applications into accidentally disclosing information that would normally be inaccessible, safe inside their protected memory area. This is a trickier one to pull off, but because it’s based on an established practice in multiple chip architectures, it’s going to be even trickier to fix.

Who is affected?

Short answer: Pretty much everybody.


Chips going back to 2011 were tested and found vulnerable, and theoretically it could affect processors as far back as those released in 1995. One would hope there aren’t too many of those in use, but we may be unpleasantly surprised on that count.

Because Meltdown and Spectre are flaws at the architecture level, it doesn’t matter whether a computer or device is running Windows, OS X, Android, or something else — all software platforms are equally vulnerable.

A huge variety of devices, from laptops to smartphones to servers, are therefore theoretically affected. The assumption going forward should be that any untested device should be considered vulnerable.

Not only that, but Meltdown in particular could conceivably be applied to and across cloud platforms, where huge numbers of networked computers routinely share and transfer data among thousands or millions of users and instances.

The good news is that the attack is easiest to perform by code being run by the machine itself — it’s not easy to pull this off remotely. So there’s that, at least.

Can this be fixed?

Short answer: Only partially, and it’s going to take a while.


Many, many devices are “affected” or “vulnerable” to these flaws, but that’s not the same thing as saying they’re totally open to attack. Intel, AMD, ARM and others have had months to create workarounds and “mitigations,” which is a polite way of saying “band-aids.”

Meltdown can be fixed essentially by building a stronger wall around the kernel; the technical term is “kernel page table isolation.” This solves the issue, but there’s a cost. Modern CPU architectures assume certain things about the way the kernel works and is accessed, and changing those things means that they won’t be able to operate at full capacity.

The Meltdown fix may reduce the performance of Intel chips by as little as 5 percent or as much as 30 — but there will be some hit. Whatever it is, it’s better than the alternative.

Spectre, on the other hand, is not likely to be fully fixed any time soon. The fact is that the practice that leads to this attack being possible is so hard-wired into processors that the researchers couldn’t find any way to totally avoid it. They list a few suggestions, but conclude:

While the stop-gap countermeasures described in the previous section may help limit practical exploits in the short term, there is currently no way to know whether a particular code construction is, or is not, safe across today’s processors – much less future designs.

What will actually happen is hard to say, but there will likely be a flurry of updates that carry out various software hacks to protect against the most obvious and damaging attacks. Microsoft has already issued one for Windows; ARM has a set of mitigations for its affected chips; Amazon is updating its many servers.

How broadly and quickly will these mitigation patches be applied, though? How many devices are out there, vulnerable, right now? These updates may not be pretty, perhaps requiring changes that will break other software, drivers, and components. And all will likely involve degrading performance.

A more permanent fix will require significant changes across the board — the circuit board, that is. Basic architecture choices that have been baked into our devices for years, even decades, will have to be rethought. It won’t be easy, and it won’t be fun.

In the meantime companies are working at full capacity to minimize the apparent threat: “mitigations” that may or may not prevent some or all of the variant attacks. As usual, these patches will likely reach only a small subset of new, fast-updating users and devices, or those the company can update directly on its own. We will only know the efficacy of these measures by their performance in the real world.

It’s worth noting that there won’t be a “recall.” If this flaw affected a single device, like the battery problems in Samsung’s phones a while back, a recall would make sense. But this is an issue that affects millions, perhaps billions of devices. A recall isn’t an option.

Why are we only just hearing about this?

Short answer: A planned joint disclosure was preempted by reporters.


It’s always a bit odd to hear that companies were informed of a major security flaw like this one months ago, as was the case with Meltdown and Spectre. This particular exploit has been under investigation for some time by researchers, and word of it trickled out in the form of small updates to various operating systems addressing a hitherto-undocumented security flaw.

If the researchers just tweeted out the details when they discovered them, it would essentially be giving attackers access to that information at the same time as the companies that can fix the problem. Generally security investigators do what’s called responsible disclosure, contacting affected companies secretly, either as a simple courtesy or in order to collaborate on a solution.

In this case Google contacted Intel several months ago, and no doubt others knew to some degree as well, since Microsoft issued patches to insiders well ahead of the public announcement, and Linux distributions were likewise addressing the issue even though the papers describing the flaw were not out yet.

The plan would normally be that the affected company or companies would come up with a solution, quietly apply it, then announce both the flaw and the solution at the same time. And in fact that seems to be what was planned in this case.

But smart reporting by The Register, which among others put together the disparate pieces, seems to have forced the hands of several billion-dollar companies. The companies scrambled to finalize their statements, addressing “inaccurate” media reports and hastily issuing patches and explanations that likely weren’t due until next week.

While some may suggest that El Reg should have let things take their course, there’s a great deal to be said for not allowing the billion-dollar companies in question to completely control the narrative around a major issue like this. If the only version of the story we ever heard was one approved by their joint committee, things would likely have been painted in a different light.

As the researchers put it at the end of the the Spectre paper:

The vulnerabilities in this paper, as well as many others, arise from a longstanding focus in the technology industry on maximizing performance. As a result, processors, compilers, device drivers, operating systems, and numerous other critical components have evolved compounding layers of complex optimizations that introduce security risks. As the costs of insecurity rise, these design choices need to be revisited, and in many cases alternate implementations optimized for security will be required.



TOPICS: Computers/Internet
KEYWORDS: amd; arm; computers; dsj02; hardwarebug; intel; kernelpanic; meltdown; spectre; windowspinglist
Navigation: use the links below to view more comments.
first previous 1-2021-4041-55 next last
To: markomalley
AMD's response:

An Update on AMD Processor Security


21 posted on 01/03/2018 7:42:42 PM PST by snarkpup (The swamp is draining; and the alligators are allegating.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: markomalley

A new kernel seems like a good idea.
As Jefferson might put it: “Every generation needs a new kernal.”


22 posted on 01/03/2018 7:46:02 PM PST by mrsmith (Dumb sluts: Lifeblood of the Media, Backbone of the Democrat/RINO Party!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bryanw92
"The 2016 election showed our masters that the internet is a nuclear weapon in the hands of the unwashed masses. They want to drive us away from it and back into the well-controlled streams of information that they count on to control us. "

Well said! This is the most important reason that the "masters" and their msm lackeys are so spazed out over the 2016 election...and D.T. is making sure their nightmares are perpetuated and made even more frightening...

Heads exploding is not enough! We need the entire body to explode...Whatever that takes...

23 posted on 01/03/2018 7:46:22 PM PST by SuperLuminal (Where is another agitator for republicanism like Sam Adams when we need him?)
[ Post Reply | Private Reply | To 10 | View Replies]

To: markomalley

Is this actually a dangerous exploit or is it hype?

How would you actually use this flaw to access sensitive data.

Would you need access as admin or root to install something or is just getting someone to click on a hyperlink enough to compromise your system.

The article is completely silent in this area.


24 posted on 01/03/2018 7:55:26 PM PST by crusher2013
[ Post Reply | Private Reply | To 1 | View Replies]

To: gibsonguy; Swordmaker
Swordmaker, your expertise is required.
25 posted on 01/03/2018 7:56:17 PM PST by Chgogal (Sessions recused himself for shaking an Ambassador's hand. Shameful!)
[ Post Reply | Private Reply | To 11 | View Replies]

To: markomalley

Back in the day I programmed a piece of code that could change MS system files while the OS was running....on disk and in memory.

I published the code on a usenet group but made it so the demo only could change a program that was running on a floppy.

The point was made though and the method was quickly patched.

I came up with the code while playing at making tiny OS’s in assembler.... and making altered BIOS chip code.

Most of the makings of a tiny OS were already there as routines in the BIOS chip. It was easy to make a tiny OS.
I made several industrial controllers out of motherboards running a tiny OS. One was a cool programmable az-el rotor controller for a large satellite dish...it would rotate the dish and also decode the morse ID that some sats sent out on an audio subcarrier. The rotor could track sats in polar orbit that moved around.

Old code I wrote for creating self-modifying programs and program generators is still in use today, two decades later.

Programming is easy for people that have OCD (like me) as the very idea that a bug might exist makes us pull our hair out...so we are very thorough.


26 posted on 01/03/2018 8:03:38 PM PST by Bobalu (12 diet Cokes and a fried chicken...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Paladin2

LoL. I think it will be just fine.

When I have to do something that needs security I put a new SD card with a fresh OS into a Raspberry Pi 3 and go online with that.


27 posted on 01/03/2018 8:05:46 PM PST by Bobalu (12 diet Cokes and a fried chicken...)
[ Post Reply | Private Reply | To 19 | View Replies]

To: markomalley; Chgogal; ~Kim4VRWC's~; 1234; 5thGenTexan; AbolishCSEU; Abundy; Action-America; ...
Another thread on the processor vulnerabilities, but this one is a bit more informative. The two vulnerabilities are "Meltdown" which affects the Intel line of processors made in the last decade, and "Spectre" which targets AMD and ARM processors.

For Apple users, the important take away for "Meltdown" is that Apple has already closed that Intel vulnerability door on December 6, 2017. The takeaway for the "Spectre" vulnerability is that it requires not only physical access to an Apple iPhone/IPad, but the user's passcode to be able to install malware onto the device. I quote from the description of the Spectre vulnerability potential to be exploited:
"In order to exploit the flaw the "attacker gains physical access by manually updating the platform with a malicious firmware image through flash programmer physically connected to the platform’s flash memory. "
This means that neither "Meltdown" or "Spectre" is a threat to Apple users at this time. — PING!

Thanks to Chgogal for the ping!


Apple Not Vulnerability to "Meltdown" and "Spectre" Malware
Ping!

The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.

If you want on or off the Mac Ping List, Freepmail me

28 posted on 01/03/2018 8:14:40 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Thanks. I knew you could translate for us.


29 posted on 01/03/2018 8:18:30 PM PST by blu (If you don't read the story at the link, don't comment. (Except for Laz...))
[ Post Reply | Private Reply | To 28 | View Replies]

To: crusher2013

I used to disassemble asm code that I would find glaring flaws in...to this day I think many of the flaws were intentional as only a moron would have coded such a mess.

It used to be sort of a hobby for me, disassembling OS code. Most of the OS code was in C and after a while you could quickly discern the original C from the compiled asm.

Another thing, the code in smartphones is a hot mess! Mostly it is written to run on an ARM processor. The firmware in the software define radio chips can be altered to move the frequencies outside the cellular bands. You can modify a smartphone into a sat phone that can work with some assets in low orbit and some in geo orbit...generally you only have 600mw of output RF power but you would be shocked at how far that can travel line-of-sight.

The software defined radio chip in those cheap 30 dollar Chinese 2mtr/440 handie talkies is very modifiable...but you have to replace the original chip with one that you can burn new code into as the original was not modifiable, but the chips are cheap...less than 2$ I have considered trying to add the AM aviation band to one but the mod would be very involved and aviation talkies have come way down in price anyway.


30 posted on 01/03/2018 8:23:09 PM PST by Bobalu (12 diet Cokes and a fried chicken...)
[ Post Reply | Private Reply | To 24 | View Replies]

To: gibsonguy
Anyone know if Apple A9’s processor is vulnerable?

As I said above in the ping:

The takeaway for the "Spectre" vulnerability is that it requires not only physical access to an Apple iPhone/IPad, but the user's passcode to be able to install malware onto the device. I quote from the description of the Spectre vulnerability potential to be exploited:

"In order to exploit the flaw the "attacker gains physical access by manually updating the platform with a malicious firmware image through flash programmer physically connected to the platform’s flash memory. "

So, due to the fact it requires physical access, and your user passcode to install the malware to be exploited, it is effectively a non-issue, like any other potential iOS malware. The problem is as usual for these iOS malware is how to get them on any users' iPhones or iPads. You have to help them do it. . . and Apple has to allow the malware into the App Store, which will not happen.

31 posted on 01/03/2018 8:24:13 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 11 | View Replies]

To: markomalley

Those of us who were putting off buying a new computer... what’s your best guess on when new computers will have the fixed chip?


32 posted on 01/03/2018 8:30:45 PM PST by GOPJ (Intelligence services coup failed. Robert Hanssen (American traitor) to get new roommates soon.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
For Apple users, the important take away for "Meltdown" is that Apple has already closed that Intel vulnerability door on December 6, 2017.

Forgot to mention that Apple closed that door with the release of macOS 10.13.2 High Sierra. If you are not running that version of macOS, you may still be vulnerable. It STILL requires physical access to your Mac to install firmware to exploit this vulnerability and Apple has already closed the door for that, even with Root access. Firmware modification access now requires an additional password above even Root on a Mac.

33 posted on 01/03/2018 8:32:08 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 28 | View Replies]

To: perfect_rovian_storm

There are several. Go google.


34 posted on 01/03/2018 9:09:36 PM PST by TexasGator (Z)
[ Post Reply | Private Reply | To 16 | View Replies]

To: butlerweave

“Again ,It’s only Intel”

Geez. Do your homework.


35 posted on 01/03/2018 9:15:22 PM PST by TexasGator (Z)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Swordmaker
Thank you again SM, for your valuable contributions. 👍
36 posted on 01/03/2018 10:09:49 PM PST by Mark17 (Genesis chapter 1 verse 1. In the beginning GOD....And the rest, as they say, is HIS-story)
[ Post Reply | Private Reply | To 33 | View Replies]

To: gibsonguy

64-bit ARM, so yep.

Spectre affects Intel, AMD, and ARM processors


37 posted on 01/03/2018 10:21:04 PM PST by LesbianThespianGymnasticMidget (God punishes Conservatives by making them argue with fools. Go Trump!)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Bryanw92

38 posted on 01/04/2018 2:43:31 AM PST by Theophilus (Repent)
[ Post Reply | Private Reply | To 10 | View Replies]

To: TexasGator

I have. It’s complete and utter BS designed to obfuscate the FACT that 100% of all Intel processors made in the past decade or more have a massive security flaw. That security flaw, if fixed, will slow the processor down by 15-50%. This is a fatal blow to Intel. The other story is meant to deflect from that and make it look like everyone is affected. Not so.


39 posted on 01/04/2018 5:44:39 AM PST by perfect_rovian_storm
[ Post Reply | Private Reply | To 34 | View Replies]

To: Swordmaker

Thanks. All my work devices are IoS.

L


40 posted on 01/04/2018 5:53:26 AM PST by Lurker (President Trump isn't our last chance. President Trump is THEIR last chance.)
[ Post Reply | Private Reply | To 28 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-55 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson