TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Reading privileged memory with a side-channel

2334 pointsby brandonover 7 years ago

76 comments

hyperion2010over 7 years ago
An analogy that was useful for explaining part of this to my (non-technical) father. Maybe others will find it helpful as well.<p>Imagine that you want to know whether someone has checked out a particular library book. The library refuses to give you access to their records and does not keep a slip inside the front cover. You can only see the record of which books you have checked out.<p>What you do is follow the person of interest into the library whenever they return a book. You then ask the librarian for a copy of the books you want to know whether the person has checked out. If the librarian looks down and says &quot;You are in luck, I have a copy right here!&quot; then you know the person had checked out that book. If the librarian has to go look in the stacks and comes back 5 minutes later with the book, you know that the person didn&#x27;t check out that book (this time).<p>The way to make the library secure against this kind of attack is to require that all books be reshelved before they can be lent out again, unless the current borrower is requesting an extension.<p>There are many other ways to use the behavior of the librarian and the time it takes to retrieve a book to figure out which books a person is reading.<p>edit: A closer variant. Call the library pretending to be the person and ask for a book to be put on hold. Then watch how long it takes them in the library. If they got that book they will be in and out in a minute (and perhaps a bit confused), if they didn&#x27;t take that book it will take 5 minutes.
评论 #16069938 未加载
评论 #16069016 未加载
评论 #16080265 未加载
评论 #16068552 未加载
评论 #16069934 未加载
jotuxover 7 years ago
Papers describing each attack:<p><a href="https:&#x2F;&#x2F;meltdownattack.com&#x2F;meltdown.pdf" rel="nofollow">https:&#x2F;&#x2F;meltdownattack.com&#x2F;meltdown.pdf</a><p><a href="https:&#x2F;&#x2F;spectreattack.com&#x2F;spectre.pdf" rel="nofollow">https:&#x2F;&#x2F;spectreattack.com&#x2F;spectre.pdf</a><p>From the spectre paper:<p>&gt;As a proof-of-concept, JavaScript code was written that, when run in the Google Chrome browser, allows JavaScript to read private memory from the process in which it runs (cf. Listing 2).<p>Scary stuff.
评论 #16066710 未加载
评论 #16066804 未加载
评论 #16066741 未加载
评论 #16066963 未加载
评论 #16066505 未加载
评论 #16071457 未加载
评论 #16070021 未加载
评论 #16066913 未加载
评论 #16084046 未加载
评论 #16070349 未加载
mrmondoover 7 years ago
&quot;AMD chips are affected by some but not all of the vulnerabilities. AMD said that there is a &quot;near zero risk to AMD processors at this time.&quot; British chipmaker ARM told news site Axios prior to this report that some of its processors, including its Cortex-A chips, are affected.&quot;<p>- <a href="http:&#x2F;&#x2F;www.zdnet.com&#x2F;article&#x2F;security-flaws-affect-every-intel-chip-since-1995-arm-processors-vulnerable&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.zdnet.com&#x2F;article&#x2F;security-flaws-affect-every-int...</a><p>* Edit:<p>From <a href="https:&#x2F;&#x2F;meltdownattack.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;meltdownattack.com&#x2F;</a><p>Which systems are affected by Meltdown?<p>&quot;Desktop, Laptop, and Cloud computers may be affected by Meltdown. More technically, every Intel processor which implements out-of-order execution is potentially affected, which is effectively every processor since 1995 (except Intel Itanium and Intel Atom before 2013). We successfully tested Meltdown on Intel processor generations released as early as 2011. Currently, we have only verified Meltdown on Intel processors. At the moment, it is unclear whether ARM and AMD processors are also affected by Meltdown.<p>Which systems are affected by Spectre?<p>Almost every system is affected by Spectre: Desktops, Laptops, Cloud Servers, as well as Smartphones. More specifically, all modern processors capable of keeping many instructions in flight are potentially vulnerable. In particular, we have verified Spectre on Intel, AMD, and ARM processors.&quot;
评论 #16066029 未加载
评论 #16066106 未加载
评论 #16067150 未加载
评论 #16066148 未加载
endymi0nover 7 years ago
Hard to find a good spot for this, but: Thanks to anyone involved! From grasping the magnitude of this vulnerability to coordinating it with all major OS vendors, including Open Source ones that do all of their stuff more or less „in the open“, it was almost a miracle that the flaw was leaked „only“ a few days before the embargo - and we‘ll all have patches to protect our infrastructure just in time.<p>Interestingly, it also put the LKML developers into an ethical grey zone, as they had to deceive the public the patch was actually fixing something else (they did a good and right thing there IMHO).<p>Despite all the slight problems along the way, kudos to any of the White Hats dealing with this mess over the last months and handling it super graceful!
评论 #16068656 未加载
评论 #16069076 未加载
tonmoyover 7 years ago
I&#x27;m not that savvy with security so I need a little help understanding this. According to the google security blog:<p>&gt; Google Chrome<p>&gt; Some user or customer action needed. More information here (<a href="https:&#x2F;&#x2F;support.google.com&#x2F;faqs&#x2F;answer&#x2F;7622138#chrome" rel="nofollow">https:&#x2F;&#x2F;support.google.com&#x2F;faqs&#x2F;answer&#x2F;7622138#chrome</a>).<p>And the &quot;here&quot; link says:<p>&gt;Google Chrome Browser<p>&gt;Current stable versions of Chrome include an optional feature called Site Isolation which can be enabled to provide mitigation by isolating websites into separate address spaces. Learn more about Site Isolation and how to take action to enable it.<p>&gt;Chrome 64, due to be released on January 23, will contain mitigations to protect against exploitation.<p>&gt;Additional mitigations are planned for future versions of Chrome. Learn more about Chrome&#x27;s response.<p>&gt;Desktop (all platforms), Chrome 63:<p>&gt; Full Site Isolation can be turned on by enabling a flag found at chrome:&#x2F;&#x2F;flags&#x2F;#enable-site-per-process. &gt; Enterprise policies are available to turn on Site Isolation for all sites, or just those in a specified list. Learn more about Site Isolation by policy.<p>Does that mean if I don&#x27;t enable this feature using chrome:&#x2F;&#x2F;flags and tell my grandma to do this complicated procedure I (or she) will be susceptible to getting our passwords stolen?
评论 #16066535 未加载
评论 #16066434 未加载
tytsoover 7 years ago
From a recently posted patch set:<p>Subject: Avoid speculative indirect calls in kernel<p>Any speculative indirect calls in the kernel can be tricked to execute any kernel code, which may allow side channel attacks that can leak arbitrary kernel data.<p>So we want to avoid speculative indirect calls in the kernel.<p>There&#x27;s a special code sequence called a retpoline that can do indirect calls without speculation. We use a new compiler option -mindirect-branch=thunk-extern (gcc patch will be released separately) to recompile the kernel with this new sequence.<p>We also patch all the assembler code in the kernel to use the new sequence.
评论 #16067028 未加载
nlhover 7 years ago
&quot;Before the issues described here were publicly disclosed, Daniel Gruss, Moritz Lipp, Yuval Yarom, Paul Kocher, Daniel Genkin, Michael Schwarz, Mike Hamburg, Stefan Mangard, Thomas Prescher and Werner Haas also reported them; their [writeups&#x2F;blogposts&#x2F;paper drafts] are at&quot;<p>Does anyone have any color&#x2F;details on how this came to be? A major fundamental flaw exists that affects all chips for ~10 years, and multiple independent groups discovered them roughly around the same time this past summer?<p>My hunch is that someone published some sort of speculative paper &#x2F; gave a talk (&quot;this flaw could exist in theory&quot;) and then everyone was off to the races.<p>But would be curious if anyone knows the real version?
评论 #16066898 未加载
评论 #16069524 未加载
评论 #16069734 未加载
rarudduckover 7 years ago
Azure&#x27;s response: <a href="https:&#x2F;&#x2F;azure.microsoft.com&#x2F;en-us&#x2F;blog&#x2F;securing-azure-customers-from-cpu-vulnerability&#x2F;" rel="nofollow">https:&#x2F;&#x2F;azure.microsoft.com&#x2F;en-us&#x2F;blog&#x2F;securing-azure-custom...</a><p>This part is interesting considering the performance concerns:<p>&quot;The majority of Azure customers should not see a noticeable performance impact with this update. We’ve worked to optimize the CPU and disk I&#x2F;O path and are not seeing noticeable performance impact after the fix has been applied. A small set of customers may experience some networking performance impact. This can be addressed by turning on Azure Accelerated Networking (Windows, Linux), which is a free capability available to all Azure customers.&quot;
评论 #16068652 未加载
评论 #16067525 未加载
webaholicover 7 years ago
Someone correct me if I understood this wrong. The way they are exploiting speculative execution is to load values from memory regions which they don&#x27;t have permission to a cache line, and when the speculation is found to be false, the processor does not undo the write to the cache line?<p>The question is, how is the speculative write going to the cache in the first place? Only retired instructions should be able to modify cache lines AFAIK. What am I missing?<p>Edit: Figured it out. The speculatively accessed memory value is used to compute the address of a load from a memory location which the attacker has access to. Once the mis-speculation is detected, the attacker will time accesses to the memory which was speculatively loaded and figure out what the secret key is. Brilliant!
评论 #16066927 未加载
adriancooneyover 7 years ago
Wow, what a find for the Project Zero team. This team and idea can only be described as a success, well done.
chrisbover 7 years ago
&quot;These vulnerabilities affect many CPUs, including those from AMD, ARM, and Intel, as well as the devices and operating systems running them.&quot;<p>Curious. All other reports I&#x27;ve read state that AMD CPUs are not vulnerable.
评论 #16065953 未加载
评论 #16065954 未加载
评论 #16065950 未加载
评论 #16065959 未加载
评论 #16065951 未加载
评论 #16065941 未加载
评论 #16065927 未加载
wslhover 7 years ago
Has Google the best security team in the world? It seems like Google security is in a complete different league. I cannot imagine how this impacts companies handling fiat money or cryptocurrencies in the cloud like Coinbase in AWS.
评论 #16066468 未加载
评论 #16066251 未加载
评论 #16066899 未加载
评论 #16067086 未加载
评论 #16066372 未加载
评论 #16067793 未加载
评论 #16066497 未加载
static_noiseover 7 years ago
So, as I gather, one of the main culprits is that unwinding of speculatively executed commands is done incompletely. That is something that the people doing the unwinding must have noticed and known. Somewhere the decision must have been made to unwind incompletely for some reasons (performance&#x2F;power&#x2F;cost&#x2F;time).<p>As for the difference between AMD and intel. (From other posts here, not this one.) The speculative execution can access arbitrary memory locations on intel processors while this is not possible on AMD. This means that on intel processors you can probe any memory location with only limited privileges.<p>As for the affected AMD and ARM processors I&#x27;m none the wiser. How are they affected? Which models are affected? Does it allow some kind of privilege escalation? The next days will surely stay interesting.
评论 #16066357 未加载
richadamsover 7 years ago
<a href="https:&#x2F;&#x2F;spectreattack.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;spectreattack.com&#x2F;</a><p>Information site with some more information, and links to papers on the two vulnerabilities, called &quot;Meltdown&quot; and &quot;Spectre&quot; (with logos, of course).<p>(<a href="https:&#x2F;&#x2F;meltdownattack.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;meltdownattack.com&#x2F;</a> goes to the same site)
评论 #16066302 未加载
评论 #16066183 未加载
tarrudaover 7 years ago
It seems that Richard Stallman is not so paranoid after all:<p>&gt; I am careful in how I use the Internet.<p>&gt; I generally do not connect to web sites from my own machine, aside from a few sites I have some special relationship with. I usually fetch web pages from other sites by sending mail to a program (see <a href="https:&#x2F;&#x2F;git.savannah.gnu.org&#x2F;git&#x2F;womb&#x2F;hacks.git" rel="nofollow">https:&#x2F;&#x2F;git.savannah.gnu.org&#x2F;git&#x2F;womb&#x2F;hacks.git</a>) that fetches them, much like wget, and then mails them back to me. Then I look at them using a web browser, unless it is easy to see the text in the HTML page directly. I usually try lynx first, then a graphical browser if the page needs it (using konqueror, which won&#x27;t fetch from other sites in such a situation).<p>Ref: <a href="https:&#x2F;&#x2F;stallman.org&#x2F;stallman-computing.html" rel="nofollow">https:&#x2F;&#x2F;stallman.org&#x2F;stallman-computing.html</a>
评论 #16066727 未加载
debtover 7 years ago
Speculative execution seems like something that would be very intuitively insecure even to a layperson(relative to the field of course).<p>I&#x27;m wondering, was this vulnerability theorized first and later found out to be an actual vulnerability? Or was this something that nobody had any clue about?<p>I&#x27;m only saying this, because from a security perspective, I imagine somewhere at some point very early on someone had to have pointed out the potential for something like speculative execution to eventually cause security problems.<p>I just don&#x27;t understand how chip designers assumed speculative execution wouldn&#x27;t eventually cause security problems. Is it because chip designers were prioritizing performance above security?
评论 #16066989 未加载
评论 #16066222 未加载
评论 #16068398 未加载
评论 #16066561 未加载
评论 #16066773 未加载
im3w1lover 7 years ago
I don&#x27;t think this is the last we have seen of side-channels, it&#x27;s just a ridicolously hard problem to get right. And for that reason I can&#x27;t feel too angry at the procesor makers.<p>And I certainly expect to see more things like this (but at least hopefully with lower bandwidth).
anonfunctionover 7 years ago
AMD put out an announcement:<p><a href="https:&#x2F;&#x2F;www.amd.com&#x2F;en&#x2F;corporate&#x2F;speculative-execution" rel="nofollow">https:&#x2F;&#x2F;www.amd.com&#x2F;en&#x2F;corporate&#x2F;speculative-execution</a>
aeleosover 7 years ago
Wow so intel comes and says what is all the panic about there is nothing wrong (despite knowing this) and then amazon drops the we are updating everything right now bomb and then google drops the mother of all cpu bugs. In a previous thread someone was asking if it really is all that bad and at this point I think it’s safe to say that yea, it is.
partiallyproover 7 years ago
So, is AMD effected or not? This seems fairly important. The Google blog post sort of goes against itself in this regard. AMD itself has said:<p>&quot;The threat and the response to the three variants differ by microprocessor company, and AMD is not susceptible to all three variants. Due to differences in AMD&#x27;s architecture, we believe there is a near zero risk to AMD processors at this time.&quot;<p>So either AMD is lying or Google&#x27;s blog post is wrong. Granted AMD&#x27;s statement is a bit muddled, not sure if they mean they aren&#x27;t susceptible to all THREE variants (as in only 1&#x2F;3) or they aren&#x27;t susceptible to ALL three variants (as in none of them.)
评论 #16067789 未加载
评论 #16067114 未加载
评论 #16066071 未加载
评论 #16066821 未加载
adrianpikeover 7 years ago
Can someone with a little more experience this low-level let me know if this is as bad as I think it is?<p>Because this looks real bad:<p>&gt; Reading host memory from a KVM guest
评论 #16066238 未加载
评论 #16066215 未加载
bloorpover 7 years ago
So is speculative execution just inherently flawed like this, or can we expect chips in 2 years that let operating systems go back to the old TLB behavior?
评论 #16066383 未加载
评论 #16066766 未加载
blattimwindover 7 years ago
So this confirms the suspicion that the bug allows VM-to-VM disclosure of memory, which would conclusively explain the rush.
rcontiover 7 years ago
What are the odds that the NSA already knew about this? Roughly 100%?
评论 #16068142 未加载
评论 #16068817 未加载
评论 #16067924 未加载
评论 #16068313 未加载
评论 #16075175 未加载
TheAlchemistover 7 years ago
I believe most crypto exchanges are running in the cloud. What could possibly go wrong ?
评论 #16066415 未加载
ateesdalejrover 7 years ago
So, basically CPUs will read instructions inside a branch even if the branch is eventually going to evaluate to false. Does the CPU do this to optimize branch instructions? The results of instructions that are executed ahead of time are stored in a cache. How exactly does this exploit read from the cache? I understand it uses timing somehow but I&#x27;m not quite sure exactly how that works. (I mostly do software.)
评论 #16066554 未加载
评论 #16066634 未加载
AndyNemmityover 7 years ago
First implementation I&#x27;ve seen on twitter.<p><a href="https:&#x2F;&#x2F;twitter.com&#x2F;pwnallthethings&#x2F;status&#x2F;948693961358667777" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;pwnallthethings&#x2F;status&#x2F;94869396135866777...</a>
cfeeleyover 7 years ago
One of the meltdown paper writers evidently has a sense of humor since &quot;hunter2&quot; [0] is one of the passwords they use in their demonstration [1]<p>[0] <a href="http:&#x2F;&#x2F;bash.org&#x2F;?244321" rel="nofollow">http:&#x2F;&#x2F;bash.org&#x2F;?244321</a><p>[1] <a href="https:&#x2F;&#x2F;meltdownattack.com&#x2F;meltdown.pdf" rel="nofollow">https:&#x2F;&#x2F;meltdownattack.com&#x2F;meltdown.pdf</a> (page 13, figure 6)
评论 #16067617 未加载
Havocover 7 years ago
So what exactly are they going to do about spectre? Seems pretty unstoppable from what I can see.<p>Can they disable speculative exec completely for sensitive boxes or is this too baked in?
评论 #16066890 未加载
_qbxpover 7 years ago
Can someone more knowledgeable than me in regards to this vulnerability tell me:<p>1. How to best protect my local personal data from being subject to this?<p>2. Whether I should seriously consider pulling all my cryptocurrency off of any exchanges?
评论 #16068841 未加载
评论 #16069274 未加载
zitterbewegungover 7 years ago
So how much legal liability are they exposed to due to this security flaw?<p>Since this affects legacy systems that may not be able to be upgraded it seems like this issue will be around for a very long time.
评论 #16066595 未加载
perennateover 7 years ago
I can&#x27;t understand this paragraph from [1]:<p>&gt; Cloud providers which use Intel CPUs and Xen PV as virtualization without having patches applied. Furthermore, cloud providers without real hardware virtualization, relying on containers that share one kernel, such as Docker, LXC, or OpenVZ are affected.<p>I take it to imply that hypervisors that use hardware virtualization are not affected. However, the PoC that reads host memory from a KVM guest seems to contradict this.<p>Is it because on Xen HVM, KVM, and similar hypervisors, only kernel pages are mapped in the address space of the VM thread (so a malicious VM cannot read memory of other VMs), but on these other hypervisors, pages from other containers are mapped? Yet the Xen security advisory [2] says:<p>&gt; Xen guests may be able to infer the contents of arbitrary host memory, including memory assigned to other guests.<p>Relatedly, what sensitive information other than passwords could appear in the kernel memory? I&#x27;d expect that at the very least buffers containing sensitive data pertaining to other VMs may be leaked.<p>[1] <a href="https:&#x2F;&#x2F;meltdownattack.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;meltdownattack.com&#x2F;</a> [2] <a href="https:&#x2F;&#x2F;xenbits.xen.org&#x2F;xsa&#x2F;advisory-254.html" rel="nofollow">https:&#x2F;&#x2F;xenbits.xen.org&#x2F;xsa&#x2F;advisory-254.html</a>
评论 #16068570 未加载
nickysielickiover 7 years ago
&gt; Meltdown breaks all security assumptions given by address space isolation as well as paravirtualized environments and, thus, every security mechanism building upon this foundation.<p>&gt; On affected systems, Meltdown enables an adversary to read memory of other processes or virtual machines in the cloud without any permissions or privileges, affecting millions of customers and virtually every user of a personal computer.
rtpgover 7 years ago
Reading over this.... it sounds like ultimately the exploit in Linux still only works thanks to being able to run stuff in the kernel context through eBPF?<p>The first section states that even with the branch prediction you still need to be in the same memory context to be able to read other process&#x27;s memory through this. But eBPF lets you run JIT&#x27;d code in the kernel context.<p>I guess this JITing is also the issue with the web browsers, where you end up getting access to the entire browser process memory.<p>But ultimately the dangerous code is still code that got a &quot;privilege upgrade&quot;? the packet filter code for eBPF, and the JIT&#x27;d JS in the browser exploit?<p>So if our software _never_ brought user&#x27;s code into the kernel space, then we would be a bit safer here? For example if eBPF worked in... kernel space, but a different kernel space from the main stuff? And Site Isolation in Chrome?
评论 #16070003 未加载
krylonover 7 years ago
I should at first point out that I am by no definition an expert on CPU design, operating systems, or infosec.<p>But I just remembered that <i>years</i> ago the FreeBSD developers discovered a vulnerability in Intel&#x27;s Hyperthreading that could allow a malicious process to read other processes&#x27; memory.[1]<p>To the degree that I understand what is going on here, that sounds very similar to the way the current vulnerabilities work.<p>For a while, back then, I was naive enough to think this would be the end of SMT on Intel CPUs, but I was very wrong about that.<p>So I am wondering - is this just a funny coincidence, or could people have seen this coming back then?<p>[1] <a href="http:&#x2F;&#x2F;www.daemonology.net&#x2F;hyperthreading-considered-harmful&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.daemonology.net&#x2F;hyperthreading-considered-harmful...</a>
makomkover 7 years ago
The ARM whitepaper is also worth a read in terms of how it affects them and mitigations on that platform: <a href="https:&#x2F;&#x2F;developer.arm.com&#x2F;support&#x2F;security-update" rel="nofollow">https:&#x2F;&#x2F;developer.arm.com&#x2F;support&#x2F;security-update</a>
KenoFischerover 7 years ago
I&#x27;m really amazed by the simplicity of the meltdown gadget. After the initial blog post I played with a few variants, but always got the zeroed out register in the speculative branch. I guess what people (including me) were looking for here was some other side channel or instruction that did not have this mitigation in place (e.g. I had hoped a cmpxchg would leak whether the target memory address matches the register to compare with). The shl&#x2F;retry loop makes a lot of sense if you instead assume that the mitigation was implemented improperly and can race subsequent uops. I really can&#x27;t imagine why this data ever made it to the bypass network to be available to other uops.
alkonautover 7 years ago
I wonder if the whole thing with enormously complex CPUs requiring deep pipelines which in turn requires complex speculation etc was a design mistake? Is there an alternative history where mainstream CPUs are equally fast with a dumber&#x2F;simpler design?
评论 #16070020 未加载
评论 #16069613 未加载
评论 #16068957 未加载
评论 #16069221 未加载
intsunnyover 7 years ago
Since no one has yet posted Amazon AWS security bulletin:<p><a href="https:&#x2F;&#x2F;aws.amazon.com&#x2F;security&#x2F;security-bulletins&#x2F;AWS-2018-013&#x2F;" rel="nofollow">https:&#x2F;&#x2F;aws.amazon.com&#x2F;security&#x2F;security-bulletins&#x2F;AWS-2018-...</a>
kodablahover 7 years ago
<a href="https:&#x2F;&#x2F;github.com&#x2F;IAIK&#x2F;meltdown" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;IAIK&#x2F;meltdown</a> 404&#x27;s. I assume this is by intention? So full disclosure, but missing the code? Or is it somewhere else?
评论 #16070144 未加载
bit_logicover 7 years ago
According to the page, Project Zero only tested with AMD Bulldozer CPUs. Why didn&#x27;t they use something based on Zen&#x2F;Ryzen? It&#x27;s not clear if the 3 issues affect Zen&#x2F;Ryzen or not.
评论 #16067026 未加载
Unklejoeover 7 years ago
Just an idea that I had:<p>If these exploits seem rely on taking precise timing measurements (on the order of nanoseconds), could we eliminate or restrict this functionality in user space?<p>The Spectre exploit uses the RDTSC instruction, and this can apparently be restricted to privilege level 0 by setting the TSD flag in CR4.<p>I know it would kind of suck, but it might be better than nothing.<p>I would think that most typical user applications wouldn&#x27;t require that accurate of a time measurement. If they do, then maybe they can be white listed?
评论 #16068085 未加载
评论 #16067351 未加载
geertjover 7 years ago
What is the reason that Intel would allow speculative instructions to bypass the supervisor bit and access arbitrary memory? That seems the root cause for Meltdown.<p>Is it that the current privilege level could be different between what it is now, and what it will be when the speculative instruction retires? If so then that seems a thin justification. CPL should not change often so it doesn&#x27;t seem worth it to allow speculative execution for instructions where a higher CPL is required.
评论 #16067564 未加载
cmurfover 7 years ago
<i>There are 3 known CVEs related to this issue in combination with Intel, AMD, and ARM architectures. Additional exploits for other architectures are also known to exist. These include IBM System Z, POWER8 (Big Endian and Little Endian), and POWER9 (Little Endian).</i><p><a href="https:&#x2F;&#x2F;access.redhat.com&#x2F;security&#x2F;vulnerabilities&#x2F;speculativeexecution" rel="nofollow">https:&#x2F;&#x2F;access.redhat.com&#x2F;security&#x2F;vulnerabilities&#x2F;speculati...</a>
anonuover 7 years ago
How come this wasn&#x27;t discovered sooner?<p>It would seem to me that all the really smart people who designed super-scalar processors and all the nifty tricks that CPUs do today - would have thought that these attacks would be in the realm of possibility. If that&#x27;s the case - who&#x27;s to say these attacks haven&#x27;t been used in the wild by sophisticated players for years now?<p>Seems like the perfect attack. Undetectable. No log traces.
Darthyover 7 years ago
Could somebody please coin a name for this? Wikipedia currently calls it &quot;Intel KPTI flaw&quot;, but that is very vague. It&#x27;s quite difficult to talk about something without a simple easy-to-remember name.<p>Edit: has been settled, it&#x27;s <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Meltdown_(security_bug)" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Meltdown_(security_bug)</a> .
评论 #16066226 未加载
评论 #16066231 未加载
Pyxl101over 7 years ago
Is there any information available about whether the Linux KPTI patch mitigates the ability to use eBPF to read kernel memory?<p>I&#x27;m asking because eBPF seems to execute within the kernel, and KPTI seemed to be about unmapping kernel page table when userspace processes execute.<p>Are there any mitigations to the eBPF attack vector?
评论 #16068317 未加载
评论 #16067370 未加载
j_coderover 7 years ago
Isn&#x27;t possible for the kernel to patch all clflush instructions when the software is loaded to keep a circular list of all evicted addresses that would be evicted again on the interrupt that happens when the protected address is read? This way the the timing attack would not be possible.
评论 #16069305 未加载
评论 #16067238 未加载
qaqover 7 years ago
Are extensions like 1password vulnerable do they run in the same process as js from a page?
评论 #16068179 未加载
ionforceover 7 years ago
Is this saying that AMD is affected? Is this the same as the Intel bug reported earlier?
评论 #16066205 未加载
评论 #16066281 未加载
评论 #16066188 未加载
muxatorover 7 years ago
From <a href="https:&#x2F;&#x2F;meltdownattack.com&#x2F;meltdown.pdf" rel="nofollow">https:&#x2F;&#x2F;meltdownattack.com&#x2F;meltdown.pdf</a>, page 12:<p>&gt; Thus, the isolation of containers sharing a kernel can be fully broken using Meltdown.
j_coderover 7 years ago
Looks like the information was somewhat public available since middle of the last year on <a href="https:&#x2F;&#x2F;cyber.wtf&#x2F;2017&#x2F;07&#x2F;28&#x2F;negative-result-reading-kernel-memory-from-user-mode&#x2F;" rel="nofollow">https:&#x2F;&#x2F;cyber.wtf&#x2F;2017&#x2F;07&#x2F;28&#x2F;negative-result-reading-kernel-...</a> and <a href="http:&#x2F;&#x2F;www.cs.binghamton.edu&#x2F;%7Edima&#x2F;micro16.pdf" rel="nofollow">http:&#x2F;&#x2F;www.cs.binghamton.edu&#x2F;%7Edima&#x2F;micro16.pdf</a>. Also similar methods from 2013 paper <a href="http:&#x2F;&#x2F;www.ieee-security.org&#x2F;TC&#x2F;SP2013&#x2F;papers&#x2F;4977a191.pdf" rel="nofollow">http:&#x2F;&#x2F;www.ieee-security.org&#x2F;TC&#x2F;SP2013&#x2F;papers&#x2F;4977a191.pdf</a> (timing side channel attacks).<p>Any reason for the panic now? Any know malware using it?
评论 #16066661 未加载
评论 #16066665 未加载
delaaxeover 7 years ago
Can someone show me an example of JavaScript code running in a browser that would display a password stored in kernel space?<p>Websites like the Guardian report that this is now the case but I don&#x27;t understand how that&#x27;s possible.
评论 #16079230 未加载
bungover 7 years ago
Will patches for this eventually trickle down to things like LineageOS?
评论 #16066587 未加载
DarronWykeover 7 years ago
Thanks to incidents like these, I&#x27;m very happily employed. One of the perks of working in infosec.<p>I hereby nominate 2018&#x27;s song to be Billy Joel&#x27;s <i>We Didn&#x27;t Start the Fire</i>.
trendiaover 7 years ago
Does this vulnerability affect Linux only, or any operating system?
评论 #16066373 未加载
Splendorover 7 years ago
Do we know how news of this got out before the disclosure date?
评论 #16066124 未加载
评论 #16066174 未加载
evibeefiover 7 years ago
This sounds really bad. I wonder: Will this have major implications on consumers other than slowed down devices?
gruezover 7 years ago
does this mean the embargo is lifted?
评论 #16066149 未加载
评论 #16066235 未加载
ebonassiover 7 years ago
Should we start to think seriously to adopt homomorphic encryption on virtualized environments?
Havocover 7 years ago
No wonder they were rushing this.
jasonlfunkover 7 years ago
As a side topic, are we really in a place that even vulnerabilities need branding and websites?
评论 #16069672 未加载
评论 #16069207 未加载
hollerithover 7 years ago
Thanks again to the geniuses who arranged things so that almost anyone can write code that I must run just so I can use the internet to find and to read public documents<p>(unless I undergo the tedious process of becoming a noscript user or something similar).
solotronicsover 7 years ago
best for now to get your crypto coins off the exchanges if you have them there
swampthinkerover 7 years ago
&quot;Testing also showed that an attack running on one virtual machine was able to access the physical memory of the host machine, and through that, gain read-access to the memory of a different virtual machine on the same host.&quot;<p>Holy shit.
评论 #16066448 未加载
评论 #16066260 未加载
评论 #16066156 未加载
评论 #16066161 未加载
评论 #16066234 未加载
评论 #16067059 未加载
baybal2over 7 years ago
&gt;running on the host, can read host kernel memory at a rate of around 1500 bytes&#x2F;second,<p>I kinda get how it works now. They force a speculative execution to do something with a protected memory address, and then measure the latency to guess the content. They did not found a way to continue execution after a page fault as rumors were.<p>The fact that speculative execution branch can access protected memory, but not to commit its own computation results to memory in ia32 was known since pentium 3 times.<p>It was dismissed as &quot;theoretical only&quot; vulnurability without possible practical application. Intel kept saying that for 20 years, but here it is, voila.<p>The ice broke in 2016 when Dmitry Ponomarev wrote about first practical exploit scenario for this well known ia32 branch prediction artifact. Since then, I believe, quite a few people were trying all and every possible instruction combination for use in timing attack until somebody finally got one that works that was shown behind closed doors.<p>Edit: google finally added reference to Ponomarev&#x27;s paper. Here is his page with some other research on the topic <a href="http:&#x2F;&#x2F;www.cs.binghamton.edu&#x2F;~dima&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.cs.binghamton.edu&#x2F;~dima&#x2F;</a>
azurezyqover 7 years ago
link for details for that from Project Zero:<p><a href="https:&#x2F;&#x2F;googleprojectzero.blogspot.com&#x2F;2018&#x2F;01&#x2F;reading-privileged-memory-with-side.html" rel="nofollow">https:&#x2F;&#x2F;googleprojectzero.blogspot.com&#x2F;2018&#x2F;01&#x2F;reading-privi...</a>
评论 #16066301 未加载
评论 #16066441 未加载
评论 #16066123 未加载
评论 #16066100 未加载
feelin_googleyover 7 years ago
In 1-2 words, IMO, the problem is &quot;over-optimisation&quot;.<p>It is perhaps beneficial to be using an easily portable OS that can be run on older computers, and a variety of architectures.<p>Sometimes older computers are resilient against some of todays attacks <i>to the extent those attacks make assumptions about the hardware and software in use</i>. (Same is true for software.)<p>When optimization reaches a point where it exposes one to attacks like the ones being discussed here, then maybe the question arises whether the optimization is actually a &quot;design defect&quot;.<p>What is the solution?<p>IMO, having choice is at least part of any solution.<p>If <i>every user is effectively &quot;forced&quot; to use the same hardware and the same software</i>, perhaps from a single source or small number of sources, then that is beneficial for those sources but, IMO, counter to a real solution for users. Lack of viable alternatives is not beneficial to users.
pjfover 7 years ago
More details at <a href="https:&#x2F;&#x2F;googleprojectzero.blogspot.com&#x2F;2018&#x2F;01&#x2F;reading-privileged-memory-with-side.html" rel="nofollow">https:&#x2F;&#x2F;googleprojectzero.blogspot.com&#x2F;2018&#x2F;01&#x2F;reading-privi...</a>
masterleepover 7 years ago
I wonder what this sentence in the Google product status page (<a href="https:&#x2F;&#x2F;support.google.com&#x2F;faqs&#x2F;answer&#x2F;7622138" rel="nofollow">https:&#x2F;&#x2F;support.google.com&#x2F;faqs&#x2F;answer&#x2F;7622138</a>) means, particularly what the inter-guest attack refers to:<p>&quot;Compute Engine customers must update their virtual machine operating systems and applications so that their virtual machines are protected from intra-guest attacks and inter-guest attacks that exploit application-level vulnerabilities&quot;
评论 #16066984 未加载
评论 #16066936 未加载
zzzcpanover 7 years ago
Does anyone know what kind of isolation still can work after all the patches? Let&#x27;s say we want to host users&#x27; processes or containers and some of them could be pwned. I see Google claiming that their VMs are isolated between the kernel and each other.
shaklee3over 7 years ago
Intel has released a statement for the codename Meltdown bug:<p><a href="https:&#x2F;&#x2F;newsroom.intel.com&#x2F;news&#x2F;intel-responds-to-security-research-findings&#x2F;" rel="nofollow">https:&#x2F;&#x2F;newsroom.intel.com&#x2F;news&#x2F;intel-responds-to-security-r...</a>
评论 #16066367 未加载
infinity0over 7 years ago
&gt; We have some ideas on possible mitigations and provided some of those ideas to the processor vendors; however, we believe that the processor vendors are in a much better position than we are to design and evaluate mitigations, and we expect them to be the source of authoritative guidance.<p>Intel: &quot;Recent reports that these exploits are caused by a “bug” or a “flaw” [..] are incorrect.&quot;<p>So much for &quot;authoritative guidance&quot;, fuck these guys.
评论 #16066240 未加载
erikbover 7 years ago
someone should honestly do a press release like &quot;Intel Bug not actually Intel only&quot; or give this thing a neutral name to search for.
评论 #16066310 未加载
dgomesbrover 7 years ago
Great, embargo was in and google went ahead disclosing and saying hear we&#x27;re here disclosing this (because they&#x27;ve patched)
评论 #16067580 未加载
kbwtover 7 years ago
The papers take a while to get to the point. I nearly fell asleep re-reading the same statements until they got to the point: speculative execution of buffer overflows.<p>Could have been said more concisely. Sadly, this seems to be the norm with academic texts.
评论 #16068878 未加载