Meltdown/Spectre patch clarification please

Page 2 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

Topweasel

Diamond Member
Oct 19, 2000
5,436
1,655
136
Not accurate.
In fact AMD archs also do not bother to check if the speculatively executed memory access request is valid. You can read it in meltdownattack site's document in p.6.4. Threre is a theoretical possibility to configure the attack that way that leakage can be performed also on AMD's archs by one or other way. But in fact AMD's server share in so low, that attacks on AMD hardware is near zero chances.
https://www.welivesecurity.com/2018/01/05/meltdown-spectre-cpu-vulnerabilities/

Updated as recently as today. Again states that AMD is un-effected by Meltdown.

Sound like you are referring to Spectre. Can you link the specific document in question?
 
Reactions: IEC

Nimrael

Junior Member
Jan 15, 2018
8
1
1
Web browsers apps are exactly that - you run the apps in a sandbox with strictly controlled access. People are always going to dodgy web sites and hence running dodgy browser apps - if they can break out of the sandbox using one of these flaws then they can take over their machine. Hence yes it can effect home users.
Well, the meltdown attck is easily noticeble. Because of CFLUSH-RELOAD scheme the L1/L2/L3 will be constantly resetted and you will experience the massive slowdowns on affected CPU core. As well other cores also will be slowed because of massive mem. controllers overload caused by this attack. And the rate of memory leakage is 503KB/sec. To dump the 4GB pool of RAM it will take near three hours. from the sandbox - maybe even more. The examples showing if sysytem is affected by flaws the exploit EXACTLY knows the adresses where to look for the data. In real usage the exploit will need to scan almost WHOLE memory, that will be changed from time to time.
You really think, that if there will be a such malicious JS capable of achieving the goal?
 

Nimrael

Junior Member
Jan 15, 2018
8
1
1
https://www.welivesecurity.com/2018/01/05/meltdown-spectre-cpu-vulnerabilities/

Updated as recently as today. Again states that AMD is un-effected by Meltdown.

Sound like you are referring to Spectre. Can you link the specific document in question?
https://meltdownattack.com/meltdown.pdf
6.4 Limitations on ARM and AMD We also tried to reproduce the Meltdown bug on several ARM and AMD CPUs. However, we did not manage to successfully leak kernel memory with the attack described in Section 5, neither on ARM nor on AMD. The reasons for this can be manifold. First of all, our implementation might simply be too slow and a more optimized version might succeed. For instance, a more shallow out-of-order execution pipeline could tip the race condition towards against the data leakage. Similarly, if the processor lacks certain features, e.g., no re-order buffer, our current implementation might not be able to leak data. However, for both ARM and AMD, the toy example as described in Section 3 works reliably, indicating that out-of-order execution generally occurs and instructions past illegal memory accesses are also performed.
 

Topweasel

Diamond Member
Oct 19, 2000
5,436
1,655
136

That is old news as part of the original announcement. It's been challenged and as of the end of last week AMD posted.

GPZ Variant 3 (Rogue Data Cache Load or Meltdown) is not applicable to AMD processors.
  • We believe AMD processors are not susceptible due to our use of privilege level protections within paging architecture and no mitigation is required.
From http://www.amd.com/en/corporate/speculative-execution

Which follows just about every security conversation since the publishing of the document.
 
Reactions: dlerious and IEC

Nimrael

Junior Member
Jan 15, 2018
8
1
1
That is old news as part of the original announcement. It's been challenged and as of the end of last week AMD posted.
At the very beginning we heard that AMD processors are not affected by all three attacks at all.
Soon after AMD admits that, well Spectre 1 attack is possible for perform, Spectre 2 attack is "near zero risk"
Now Spectre 2 attack is possible.
Since the publishing the initial research NO fundamental reasearch were performed to make a AMD archs to be exploitable. because the memory space separation was already patched.
Tell me - WHO provided the deep analysis& except for the AMD PR's who primarily denies even the Spectre 1 and 2 threats.
 

Topweasel

Diamond Member
Oct 19, 2000
5,436
1,655
136
At the very beginning we heard that AMD processors are not affected by all three attacks at all.
Soon after AMD admits that, well Spectre 1 attack is possible for perform, Spectre 2 attack is "near zero risk"
Now Spectre 2 attack is possible.
Since the publishing the initial research NO fundamental reasearch were performed to make a AMD archs to be exploitable. because the memory space separation was already patched.
Tell me - WHO provided the deep analysis& except for the AMD PR's who primarily denies even the Spectre 1 and 2 threats.
AMD never said it wasn't susceptible to Spectre 1 and 2. Their first statements were clear. 1 They were suseptable to and 2 they were suseptable to but that design wise they considered it a near zero risk. But 2 can be patched for and they did so. Just because they patched for a near zero risk exploitation doesn't mean the threat was higher.

Is this what the world has come to? Patching for a ridiculously small security risk is some kind admission of a large security issue?
 

TimCh

Member
Apr 7, 2012
55
52
91
At the very beginning we heard that AMD processors are not affected by all three attacks at all.
Soon after AMD admits that, well Spectre 1 attack is possible for perform, Spectre 2 attack is "near zero risk"
Now Spectre 2 attack is possible.
Since the publishing the initial research NO fundamental reasearch were performed to make a AMD archs to be exploitable. because the memory space separation was already patched.
Tell me - WHO provided the deep analysis& except for the AMD PR's who primarily denies even the Spectre 1 and 2 threats.

You would have been better off if you har the statements from AMD and not just random articles on the internet. AMD never denied Spectre 1 nor 2, people who claim otherwise is either dishonest or ignorant.
 

imported_ats

Senior member
Mar 21, 2008
422
63
86
I doubt that, if BIOS/OS level is not enough, then any malicious code inside their VM can compromise the entire machine. Either the BIOS/OS patches are necessary and enough, or there is no fix for this and it all depends on the security of the software you are running.

Bios lvl code is merely a ucode patch to expose more core functionality to be used by programs to mitigate Spectre attacks. And part of the issue with Spectre is that you pretty much have to have every piece of software that hosts other software updated.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |