Archived material Access restricted Article
Rantburg

Today's Front Page   View All of Thu 01/04/2018 View Wed 01/03/2018 View Tue 01/02/2018 View Mon 01/01/2018 View Sun 12/31/2017 View Sat 12/30/2017 View Fri 12/29/2017
1
2018-01-04 Science & Technology
Buzzfeed: Researchers Found Two Major Security Flaws In Processors That Affect Most Of The World's Computers
Archived material is restricted to Rantburg regulars and members. If you need access email fred.pruitt=at=gmail.com with your nick to be added to the members list. There is no charge to join Rantburg as a member.
Posted by charger 2018-01-04 00:00|| || Front Page|| [2 views ]  Top

#1 Well I guess its time to fire up the ole Apple II... Or that old 68K Mac I have in my closet.
Posted by CrazyFool 2018-01-04 00:24||   2018-01-04 00:24|| Front Page Top

#2 I am wondering if they are due to speculative execution or virtualization hardware.
Posted by 3dc 2018-01-04 01:53||   2018-01-04 01:53|| Front Page Top

#3 I think the use of the word ‘flaw’ instead of ‘design’ is an editorial decision.
Posted by Airandee  2018-01-04 06:23||   2018-01-04 06:23|| Front Page Top

#4 This work was supported in part by NSF awards #1514261 and #1652259, financial assistance award 70NANB15H328 from the U.S. Department of Commerce, National Institute of Standards and Technology, the 2017-2018 Rothschild Postdoctoral Fellowship, and the Defense Advanced Research Project Agency (DARPA)

By Design you say?
Posted by Bright Pebbles 2018-01-04 08:08||   2018-01-04 08:08|| Front Page Top

#5 This explains it pretty well.

Basically it uses speculative execution to read an arbitrary address

Basically it does this via a side effect.

The execution doesn't stall when it reads from private memory, but continues until the processor separately decides if that location was allowed, (which is slow) so to stop a stall it AssUMes it works.

Now it uses the value it got from the memory multiplies it by the internal block size(4096) and that will request it.

Now before the exploit the 256 blocks of 4096 are made to be non-cached.

After the processor catches up with the non-allowed address (page fault) and reverts the speculative execution it will have un-cached a 4096 byte block of memory which will be at an offset representing the value of the byte at that (ARBITRARY!) address!

Brilliant!
Posted by Bright Pebbles 2018-01-04 08:32||   2018-01-04 08:32|| Front Page Top

#6 Wait until we have dice and a teapot in the circuit (quantum entangled quantum computing). Then adding Schrodinger's Cat to a calculation has to open up all sorts of strange outcomes.

Posted by 3dc 2018-01-04 10:02||   2018-01-04 10:02|| Front Page Top

#7 
Posted by 3dc 2018-01-04 10:04||   2018-01-04 10:04|| Front Page Top

#8 typically, when one switches tasks one does cache invalidation in SW,. That is a question the study didn't even address.
Posted by 3dc 2018-01-04 10:14||   2018-01-04 10:14|| Front Page Top

#9 so, cache line invalidation only sorta works..

typically, when one switches tasks one does cache invalidation in SW,.

Basically, you need Translation Lookaside buffers in multi-core architectures, to allow flexibility in CPU processor core allocation. otherwise moving a task from one core to the other will take a big penalty, you have to re-load the cache..


Posted by 3dc 2018-01-04 10:26||   2018-01-04 10:26|| Front Page Top

#10 No idea what effects it has on virtual computers. Perhaps a solution is to fix it in virtualization and only have the new virtualization code running in ring 0 not an OS or program in anything but virtualization.
Posted by 3dc 2018-01-04 11:14||   2018-01-04 11:14|| Front Page Top

#11 Meltdown is also, short term, a very good argument for massive caches on the processor die. They would reduce the potential of a cache miss which opens these options. So if you are buying a new processor or machine optimize for the cpu with more massive on chip cache. (Intel top of the line of any design usually have much larger on chip cache)
Posted by 3dc 2018-01-04 13:12||   2018-01-04 13:12|| Front Page Top

#12 Its great to be king AMD.
Posted by Procopius2k 2018-01-04 15:28||   2018-01-04 15:28|| Front Page Top

#13 Good gosh. I only retired a few years ago and while what you say sounds reasonable the gray cells just aren't cooperating. I cut my teeth on Knuth in '79 and it served me well for 30 years, but...............................8^(
Posted by AlanC 2018-01-04 15:58||   2018-01-04 15:58|| Front Page Top

#14 AMD, ARM all of them have this problem.
Posted by 3dc 2018-01-04 18:38||   2018-01-04 18:38|| Front Page Top

#15 And the one thing that physicists cannot stand is a smart ass...
Posted by Sock Puppet of Doom 2018-01-04 19:01||   2018-01-04 19:01|| Front Page Top

#16 Been working some on this at work. Seems Microsoft has a patch out and so does Red Hat (and CentOS). I expect Apple will follow suit.

Question is that the patch is said to impact performance to various degrees.
Posted by CrazyFool 2018-01-04 21:37||   2018-01-04 21:37|| Front Page Top

#17 Are AMD processors affected?

Much, much less than Intel chips. All modern CPUs are vulnerable to Spectre attacks, but AMD says that its CPUs have “near zero” risk to one variant due to the way they’re constructed. The performance impact of Spectre patches are expected to be “negligible.”

There is “zero AMD vulnerability” to Meltdown thanks to chip design, AMD says. If operating system patches exclude AMD CPUs from the new Meltdown restrictions, the performance war between Intel’s chips and AMD’s new Ryzen CPUs may get even tighter.
- cite.
Posted by Procopius2k 2018-01-04 22:05||   2018-01-04 22:05|| Front Page Top

23:29 newc
23:26 newc
23:21 newc
23:19 newc
22:05 Procopius2k
21:58 newc
21:57 newc
21:53 newc
21:51 newc
21:49 newc
21:46 newc
21:37 CrazyFool
19:31 swksvolFF
19:29 Betty Hatfield5124
19:01 Sock Puppet of Doom
18:57 Frank G
18:38 3dc
18:37 ed in texas
18:36 Frank G
18:32 Frank G
18:06 Procopius2k
16:54 Zhang Fei
16:53 Zhang Fei
16:49 Besoeker









Paypal:
Google
Search WWW Search rantburg.com