Flutterby™! : Security Exploits for the new year

Next unread comment / Catchup all unread comments User Account Info | Logout | XML/Pilot/etc versions | Long version (with comments) | Weblog archives | Site Map | | Browse Topics

Security Exploits for the new year

2018-01-01 20:09:48.011003+01 by Dan Lyke 8 comments

python sweetness: The mysterious case of the Linux Page Table Isolation patches in which it is posited that there's a major security issue in all modern CPU architectures that the maintainers of the NT and Linux kernels are currently rolling out fixes for, but that the fixes are probably going to have huge performance impacts.

And these are likely related to the Rowhammer issues in modern SDRAM.

... And ...

IOHIDeous, a fascinating deep dive:

This is the tale of a macOS-only vulnerability in IOHIDFamily that yields kernel r/w and can be exploited by any unprivileged user.

[ related topics: Free Software Microsoft Open Source Theater & Plays Law Monty Python Macintosh Python Furniture ]

comments in ascending chronological order (reverse):

#Comment Re: Security Exploits for the new year made: 2018-01-03 00:26:14.968977+01 by: Dan Lyke [edit history]

RT @find_evil Jackie Stokes 🙋🏽:

🔥 Link/Discussion https://news.ycombinator.com/item?id=16046636

🔥 Linux Fix/Backported https://git.kernel.org/pub/scm...589282b87666f92b6c3c917c8080a9bf

🔥 AMD Engineer: "Not affected" link: https://lkml.org/lkml/2017/12/27/2

🔥 Read Brad's TL https://twitter.com/grsecurity/status/947147105684123649

🔥 M$ working on fix https://twitter.com/aionescu/status/930412525111296000

🔥 Bonus Link! https://www.fool.com/investing...eo-just-sold-a-lot-of-stock.aspx

#Comment Re: Security Exploits for the new year made: 2018-01-03 23:39:57.089692+01 by: Dan Lyke

Google Project Zero takes credit for finding the flaw: https://security.googleblog.co...vulnerability-what-you-need.html

#Comment Re: Security Exploits for the new year made: 2018-01-04 00:48:35.364984+01 by: TheSHAD0W

Good god.

#Comment Re: Security Exploits for the new year made: 2018-01-04 02:01:55.1056+01 by: Dan Lyke

Yeah, also: what's gonna happen with cloud compute? Are we suddenly gonna end up paying more for capabilities? Are EC2 and the like performance hits passed on to us? What does this mean for those machine's lifecycles?

Lots of "holy crap" here to go around.

#Comment Re: Security Exploits for the new year made: 2018-01-04 02:05:11.074611+01 by: Dan Lyke

Also worth noting: There are two exploits involved in this, one that's been labeled "meltdown", that's the Intel-only bug that has some potential mitigation with performance costs (but may be exploitable with JavaScript), the other that's been labeled "spectre", and that impacts anything with speculative execution, including ARM and AMD, and is probably only exploitable with native code, but nobody has a mitigation for.

#Comment Re: Security Exploits for the new year made: 2018-01-04 03:12:20.560592+01 by: spc476

The mitigation I've heard for "spectre" is to add MFENCE instructions basically all over the place to prevent speculative execution (added by the compiler). Woot! Compute like it's 1989!

#Comment Re: Security Exploits for the new year made: 2018-01-04 20:49:34.670232+01 by: Dan Lyke

Yeah, sounds like the various JavaScript JIT engines are getting massive slowdowns to make those environments safer.

#Comment Re: Security Exploits for the new year made: 2018-01-06 00:31:44.038963+01 by: Dan Lyke

Why Raspberry Pi isn't vulnerable to Spectre or Meltdown