Kernel memory leaking Intel processor design flaw

Page 11 of 14 FirstFirst ... 910111213 ... LastLast

  1. Posts : 27,183
    Win11 Pro, Win10 Pro N, Win10 Home, Windows 8.1 Pro, Ubuntu
       #100

    Edwin said:
    Remember to add an extra layer of security to your browsers as well.



    Firefox, apparently, addressed the issue yesterday with the 57.0.4 patch, but,
    in Chrome, it would be prudent to enable Strict Site Isolation!

    Thanks for the heads up @Edwin, I just did it now.

    For others wanting to do it:
    1. On your computer, open Chrome.
    2. In the address bar at the top, enter chrome://flags/#enable-site-per-process and press Enter.
    3. Next to "Strict site isolation," click Enable.

    4. Click Relaunch now.
    Increase security with site isolation - Google Chrome Help
      My Computers


  2. Posts : 2,667
    Windows 11 21H2 (22000.593)
       #101

    Josey Wales said:
    There’s no evidence that bad actors have yet exploited the bugs, but companies from Microsoft to Mozilla said this week they have worked to patch up vulnerabilities to their operating systems and browsers to protect against one of the bugs. Researchers say the other is harder to fix and “will haunt us for quite some time.”
    Here’s a look at what’s affected, what’s being done about it and whether you should worry.
    ___
    INTEL INSIDE

    Intel is at the center of the problem because it supplies the processors used in many of the world’s PCs. Researchers say one of the bugs, called Meltdown, affects nearly every processor it’s made since the mid-1990s.

    While security flaws are typically limited to a specific company or product, Intel says the problem is “not a bug or a flaw in Intel products” but rather a broader problem affecting processing techniques common to modern computing platforms.
    Both the chipmaker and Google, which informed Intel about the vulnerability in June, said they were planning to disclose the issue next week when fixes will be available. Tech companies typically withhold details about security problems until fixes are available so that hackers wouldn’t have a roadmap to exploit the flaws. But in this case, Intel was forced to disclose the problem Wednesday after British technology site The Register reported it, causing Intel’s stock to fall.
    Most of the immediate fixes will be limited to the Meltdown bug. The other, Spectre, is harder to fix, but also harder to exploit, making it less of an immediate threat to consumer devices.

    Source AP and Intel
    Which basically screams that part of the problem underlying this bug is hyperthreading.

    fdegrove said:
    Hi,



    Drivers for chipsets and MEI are not what these security issues are about. It's the firmware that is.
    A micro code update is not a BIOS/UEFI update it's a CPU update.

    Cheers,
    ^^^^this

    Cliff S said:
    Thanks for the heads up @Edwin, I just did it now.

    For others wanting to do it:
    Increase security with site isolation - Google Chrome Help
    Be advised that this can cause issues in other ways - it is basically a browser-levle implementation of Cross-Site scripting blocking, similar to what the venerable Firefox Addon NoScript does, but with brute-force.

    You can also enable it on a per-site basis, or, alternately, enable it for the browser and disable it for particular sites, but you'll have to play around and see how it affects you.

    Also, from Site Isolation - The Chromium Projects

    Known Issues
    Support for Site Isolation is still in progress, and there are a set of known issues when turning it on in its current form. The current known issues described below affect the sites that are isolated, which may include all sites or just certain sites (as explained in "How to Configure" below). Some users or enterprises may find the security benefits worth the current tradeoff.

    For users:

    Higher memory use (about 10-20% when isolating all sites with many tabs open).
    This overhead can be greatly reduced by only isolating certain sites, as noted below.

    When printing a page, cross-site iframes appear blank.
    To print the complete web page content, save the page locally, then open and print the saved file.

    In some cases, clicking or scrolling on cross-site iframes may not work properly.
    For example, this can happen when there is a partly transparent overlay above an iframe.

    When using the "Isolating certain sites" approach below, some login popups (i.e., certain OAuth cases) may encounter problems.
    (This is fixed in the upcoming Chrome 63.0.3239.132 version, and does not affect the "Isolating all sites" approach.)

    For web developers:

    Chrome's Developer Tools do not yet fully support cross-site iframes.
    For example:
    Network requests from cross-site iframes are not displayed in DevTools. (This is fixed in Chrome 64.)
    Cookies are not displayed for cross-site subresource requests.

    The window.performance API is not yet supported in cross-site iframes.

    Website testing frameworks such as ChromeDriver don't yet support cross-site iframes.

    We are working to resolve these issues so that Site Isolation can be enabled more broadly.
    Also, they suggest the following:

    Disabling
    If you encounter problems when Site Isolation is enabled, you can try turning it off by undoing the steps above, to see if the problem goes away.

    Note that some issues may be resolved by turning off just the document blocking feature, which leaves some of the protections from process isolation in place. To try this, start Chrome with the following command line flag:
    --disable-features=CrossSiteDocumentBlockingIfIsolating

    We encourage you to file bugs if you do encounter problems when using Site Isolation by visiting https://new.crbug.com, describing the problem, and mentioning that you are using Site Isolation.
      My Computers


  3. Posts : 2,667
    Windows 11 21H2 (22000.593)
       #102

    Well, this is interesting:

    Google develops protection against Spectre attack that has hardly any impact on performance - Myce.com

    Google has developed a method called ‘Retpoline’ that should protect computers against the Spectre attack and similar ‘branch target injection’ attacks. Despite earlier reports that fixes for the issue would have a negative impact on performance, Google claims its solution hardly slows down systems.
    With Google’s Retpoline method some instructions are isolated from the CPUs branch prediction feature. That should prevent the Spectre attack and similar attacks. The search giant has deployed the Retpoline code on its own system and states it has hardly any impact on performance.
    Visiting the link above there is a link to the actual Google Help page post about 'Retpolie': Retpoline: a software construct for preventing branch-target-injection - Google Help

    Executive Summary

    “Retpoline” sequences are a software construct which allow indirect branches to be isolated from speculative execution. This may be applied to protect sensitive binaries (such as operating system or hypervisor implementations) from branch target injection attacks against their indirect branches.
    And it seems that Google Engineers are not without humor:

    The name “retpoline” is a portmanteau of “return” and “trampoline.” It is a trampoline construct constructed using return operations which also figuratively ensures that any associated speculative execution will “bounce” endlessly.

    (If it brings you any amusement: imagine speculative execution as an overly energetic 7-year old that we must now build a warehouse of trampolines around.)
    Then, there is this paragraph, which affirms that this is a newly discovered exploit:

    The strategies used to make this prediction vary between hardware implementations, they are commonly not isolated between security domains to reduce complexity and improve performance. While this has been previously exploited by probing the state of these predictors to infer the layout of another domain1, there were not previously known observable data side-effects.
    And, finally, there is this little tidbit that basically confirms why there is no microcode solution to this problem:

    Unfortunately, it is not practical or reasonable to avoid indirect branches in the construction of this software. This means that we need an efficient method of constructing an indirect branch that is not subject to external manipulation in its retirement.
    If you think about it, that not only clearly says that the problem lies in the software, but also bolsters Intel's claims that this is not an Intel-only problem. What this says to me is that "Look, the issue that can be exploited is able to be exploited because of the way that the software is written to make use of the hardware's capabilities." And while this may very well be true, it is also going to be one of the focal points for any lawsuits that anyone tries to bring again Intel / all chip manufacturers - it's not the hardware's fault that the software was written in a way that such and exploit was created.
      My Computers


  4. Posts : 369
    Windows 10 x64 Pro 22H2
       #103

    I only see a mess in this... no one clearly knows what is going on, that's for sure. They were quick to give names, speculation and even trying to make people sue hardware vendors...

    This looks so fishy still...
      My Computer


  5. Posts : 2,445
    Windows 10 Pro 64-Bit (1809)
       #104

    Cliff S said:
    Thanks for the heads up @Edwin, I just did it now.

    For others wanting to do it:
    Increase security with site isolation - Google Chrome Help
    Cheers Cliff
      My Computers


  6. Posts : 2,832
    Windows 10 Pro X64
       #105

    Hi,

    And while this may very well be true, it is also going to be one of the focal points for any lawsuits that anyone tries to bring again Intel / all chip manufacturers - it's not the hardware's fault that the software was written in a way that such and exploit was created.
    Hmmm... It's a bit of a chicken/egg thing, isn't it ? CPU is offering the option, software coders using it. Who's to blame who ?
    Thing is, if it were to be so easy to exploit would it then not have been exploited a long, long time ago ?

    Google's Retpoline sounds like a medicin to me. Quite funny naming.

    Cheers,
      My Computers


  7. Posts : 2,667
    Windows 11 21H2 (22000.593)
       #106

    FerchogtX said:
    I only see a mess in this... no one clearly knows what is going on, that's for sure. They were quick to give names, speculation and even trying to make people sue hardware vendors...

    This looks so fishy still...
    Quick? They started exploring the possibility of an exploit over a year and a half ago. It was reveled to Intel back in June - 7 months ago.

    I don't see anything quick here. Except the modern 'media' hype.
    fdegrove said:
    Hi,



    Hmmm... It's a bit of a chicken/egg thing, isn't it ? CPU is offering the option, software coders using it. Who's to blame who ?
    Thing is, if it were to be so easy to exploit would it then not have been exploited a long, long time ago ?

    Google's Retpoline sounds like a medicin to me. Quite funny naming.

    Cheers,
    Not necessarily. Google's coding fix show how figure could easily have been coded from the beginning to avoid the exploit. But in the interest of performance, software was coded to not clear the fill in the ghost thread, which is why this exploit exists.
      My Computers


  8. Posts : 2,832
    Windows 10 Pro X64
       #107

    Hi,

    But in the interest of performance, software was coded to not clear the fill in the ghost thread, which is why this exploit exists
    I'm aware of that John (if I may call you so). But let's not forget it's a speculative exploit and that kind needs computing power to "guess" correctly.
    Still, I agree that this should be fixed. And... if it can be done without impacting performance too much then I'm all for it for sure.

    Best,
      My Computers


  9. Posts : 983
    Windows 7/64 Professional
       #108

    I have been watching a lot of video's on this new problem and I'm not particularly worried. The companies that will be hit the most will be Intel and Microsoft for one good reason. They own the market share and have for a long time. Those two companies have more operating systems and CPU's out in the world than the rest put together.
    Looking at the stock market tells a story. AMD stock went way up.
    I do wonder you release the problem to the News before the updates were available.

    I won't be changing to another brand CPU. I have complete trust that Intel will solve the problem as soon as possible, with the loss of speed as low as possible. If I loose 5 % no big deal; my systems will still be super fast. If need be I will just over clock them a bit more.
    As you all can tell, I'm a Intel fan person. I have used Intel for a lot of years but I started off being a AMD person.
    When I learned more I move to Intel because of a Intel Dealer here in town. I tried Intel for CPU's and SSD's and I will stick with them.

    I believe this Flash News about this problem is way over hyped. Saying that I do want the problem fixed as smoothly as possible, now that all the hackers in the world know where to point their hacks.

    We will just get in about a week or so of a new security problem and the fix, just like we have been getting for as long as I can remember.
    The hackers are always trying new ways of screwing things up. That is what they get paid for.
    When we get security patches in Windows you will notice Microsoft never states exactly how the security problem is fixed.
    They really don't want the bad guys to know any more information.

    Just my thoughts.

    Jack
      My Computers


  10. Posts : 3,453
       #109

    Layback Bear said:
    I have been watching a lot of video's on this new problem and I'm not particularly worried. The companies that will be hit the most will be Intel and Microsoft for one good reason. They own the market share and have for a long time. Those two companies have more operating systems and CPU's out in the world than the rest put together.
    Looking at the stock market tells a story. AMD stock went way up.
    I do wonder you release the problem to the News before the updates were available.

    I won't be changing to another brand CPU. I have complete trust that Intel will solve the problem as soon as possible, with the loss of speed as low as possible. If I loose 5 % no big deal; my systems will still be super fast. If need be I will just over clock them a bit more.
    As you all can tell, I'm a Intel fan person. I have used Intel for a lot of years but I started off being a AMD person.
    When I learned more I move to Intel because of a Intel Dealer here in town. I tried Intel for CPU's and SSD's and I will stick with them.

    I believe this Flash News about this problem is way over hyped. Saying that I do want the problem fixed as smoothly as possible, now that all the hackers in the world know where to point their hacks.

    We will just get in about a week or so of a new security problem and the fix, just like we have been getting for as long as I can remember.
    The hackers are always trying new ways of screwing things up. That is what they get paid for.
    When we get security patches in Windows you will notice Microsoft never states exactly how the security problem is fixed.
    They really don't want the bad guys to know any more information.

    Just my thoughts.

    Jack
    I agree, Intel is good... however, I think, they have been cutting corners to get the performance and now the vulnerabilities are surfacing...
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 03:43.
Find Us




Windows 10 Forums