Flutterby™! : Security Exploits for the new year

Next unread comment / Catchup all unread comments User Account Info | Logout | XML/Pilot/etc versions | Long version (with comments) | Weblog archives | Site Map | | Browse Topics

Security Exploits for the new year

2018-01-01 19:09:48.011003+00 by Dan Lyke 8 comments

python sweetness: The mysterious case of the Linux Page Table Isolation patches in which it is posited that there's a major security issue in all modern CPU architectures that the maintainers of the NT and Linux kernels are currently rolling out fixes for, but that the fixes are probably going to have huge performance impacts.

And these are likely related to the Rowhammer issues in modern SDRAM.

... And ...

IOHIDeous, a fascinating deep dive:

This is the tale of a macOS-only vulnerability in IOHIDFamily that yields kernel r/w and can be exploited by any unprivileged user.

[ related topics: Free Software Microsoft Open Source Theater & Plays Law Monty Python Macintosh Python Furniture ]

comments in ascending chronological order (reverse):

#Comment Re: Security Exploits for the new year made: 2018-01-02 23:26:14.968977+00 by: Dan Lyke [edit history]

RT @find_evil Jackie Stokes 🙋🏽:

🔥 Link/Discussion https://news.ycombinator.com/item?id=16046636

🔥 Linux Fix/Backported https://git.kernel.org/pub/scm...589282b87666f92b6c3c917c8080a9bf

🔥 AMD Engineer: "Not affected" link: https://lkml.org/lkml/2017/12/27/2

🔥 Read Brad's TL https://twitter.com/grsecurity/status/947147105684123649

🔥 M$ working on fix https://twitter.com/aionescu/status/930412525111296000

🔥 Bonus Link! https://www.fool.com/investing...eo-just-sold-a-lot-of-stock.aspx

#Comment Re: Security Exploits for the new year made: 2018-01-03 22:39:57.089692+00 by: Dan Lyke

Google Project Zero takes credit for finding the flaw: https://security.googleblog.co...vulnerability-what-you-need.html

#Comment Re: Security Exploits for the new year made: 2018-01-03 23:48:35.364984+00 by: TheSHAD0W

Good god.

#Comment Re: Security Exploits for the new year made: 2018-01-04 01:01:55.1056+00 by: Dan Lyke

Yeah, also: what's gonna happen with cloud compute? Are we suddenly gonna end up paying more for capabilities? Are EC2 and the like performance hits passed on to us? What does this mean for those machine's lifecycles?

Lots of "holy crap" here to go around.

#Comment Re: Security Exploits for the new year made: 2018-01-04 01:05:11.074611+00 by: Dan Lyke

Also worth noting: There are two exploits involved in this, one that's been labeled "meltdown", that's the Intel-only bug that has some potential mitigation with performance costs (but may be exploitable with JavaScript), the other that's been labeled "spectre", and that impacts anything with speculative execution, including ARM and AMD, and is probably only exploitable with native code, but nobody has a mitigation for.

#Comment Re: Security Exploits for the new year made: 2018-01-04 02:12:20.560592+00 by: spc476

The mitigation I've heard for "spectre" is to add MFENCE instructions basically all over the place to prevent speculative execution (added by the compiler). Woot! Compute like it's 1989!

#Comment Re: Security Exploits for the new year made: 2018-01-04 19:49:34.670232+00 by: Dan Lyke

Yeah, sounds like the various JavaScript JIT engines are getting massive slowdowns to make those environments safer.

#Comment Re: Security Exploits for the new year made: 2018-01-05 23:31:44.038963+00 by: Dan Lyke

Why Raspberry Pi isn't vulnerable to Spectre or Meltdown

Add your own comment:

(If anyone ever actually uses Webmention/indie-action to post here, please email me)




Format with:

(You should probably use "Text" mode: URLs will be mostly recognized and linked, _underscore quoted_ text is looked up in a glossary, _underscore quoted_ (http://xyz.pdq) becomes a link, without the link in the parenthesis it becomes a <cite> tag. All <cite>ed text will point to the Flutterby knowledge base. Two enters (ie: a blank line) gets you a new paragraph, special treatment for paragraphs that are manually indented or start with "#" (as in "#include" or "#!/usr/bin/perl"), "/* " or ">" (as in a quoted message) or look like lists, or within a paragraph you can use a number of HTML tags:

p, img, br, hr, a, sub, sup, tt, i, b, h1, h2, h3, h4, h5, h6, cite, em, strong, code, samp, kbd, pre, blockquote, address, ol, dl, ul, dt, dd, li, dir, menu, table, tr, td, th

Comment policy

We will not edit your comments. However, we may delete your comments, or cause them to be hidden behind another link, if we feel they detract from the conversation. Commercial plugs are fine, if they are relevant to the conversation, and if you don't try to pretend to be a consumer. Annoying endorsements will be deleted if you're lucky, if you're not a whole bunch of people smarter and more articulate than you will ridicule you, and we will leave such ridicule in place.


Flutterby™ is a trademark claimed by

Dan Lyke
for the web publications at www.flutterby.com and www.flutterby.net.