Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 18 submissions in the queue.
posted by Fnord666 on Tuesday January 02 2018, @02:29AM   Printer-friendly
from the starting-off-the-new-year-right dept.

Spotted over on HN:

The mysterious case of the Linux Page Table Isolation patches (archive)

tl;dr: there is presently an embargoed security bug impacting apparently all contemporary CPU architectures that implement virtual memory, requiring hardware changes to fully resolve. Urgent development of a software mitigation is being done in the open and recently landed in the Linux kernel, and a similar mitigation began appearing in NT kernels in November. In the worst case the software fix causes huge slowdowns in typical workloads. There are hints the attack impacts common virtualization environments including Amazon EC2 and Google Compute Engine, and additional hints the exact attack may involve a new variant of Rowhammer.

Turns out 2018 might be more interesting than first thought. So grab some popcorn and keep those systems patched!


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2, Interesting) by Anonymous Coward on Tuesday January 02 2018, @05:48AM (11 children)

    by Anonymous Coward on Tuesday January 02 2018, @05:48AM (#616635)

    > This isn't even a bug at all. It's a side-channel attack. Side channel attacks are not bugs. Not every security issue results from a bug. Stupid summary.

    The idea is that there is likely an undisclosed hardware bug that can be exploited if you know the physical addresses (Like Row-hammer). These physical addresses can be recovered via the side channel attack these patches are mitigating.

    Leaking physical addresses might not be considered a bug, but that does not mean side channel attack vulnerability is not a bug! You can't categorically say side channel data leakage bugs are not bugs: If the linux kernel leaked the root password to user space via some timing side channel, it would be a bug.

    Starting Score:    0  points
    Moderation   +2  
       Interesting=2, Total=2
    Extra 'Interesting' Modifier   0  

    Total Score:   2  
  • (Score: 2) by arcz on Tuesday January 02 2018, @08:45AM (10 children)

    by arcz (4501) on Tuesday January 02 2018, @08:45AM (#616664) Journal
    maybe. but whether it is a hardware bug or software bug depends on what the guarantees the hardware provides is. if the hardware provides documented branch prediction, it's a software issue, not a hardware one, that you didn't use a method not vulnerable to side-channel attacks. It's not enough to show the existence of a side-channel attack to show there is a hardware bug, you must show that the hardware was designed to prevent that attack.
    • (Score: 3, Insightful) by Dr Spin on Tuesday January 02 2018, @10:01AM (8 children)

      by Dr Spin (5239) on Tuesday January 02 2018, @10:01AM (#616673)

      "Its not a bug, its a feature" is not a defence. If a plane falls out of the sky because it is Thursday, whether or not the manufacturer told you their planes are not reliable on Thursdays, it is not an adequate defence - even if they claim that they tested it in February, and it often works on Thursdays in February.

      If the hardware shows Rowhammer vulnerability: it is faulty, and should be returned to the manufacturer no software work arounds.

      --
      Warning: Opening your mouth may invalidate your brain!
      • (Score: 2) by Wootery on Tuesday January 02 2018, @11:25AM (5 children)

        by Wootery (2341) on Tuesday January 02 2018, @11:25AM (#616684)

        it is faulty, and should be returned to the manufacturer no software work arounds.

        Way to ignore the way imperfections scale in computer systems.

        An imperfection in the design of a shovel, causes some percentage of your customers to (rightly) ask for a refund when their shovel breaks.

        CPUs are not like shovels. Your position appears to be that unless the CPU is perfect, all customers are entitled to a refund. This is clearly absurd.

        Want a screw that will never rust or fail unexpectedly? You can get those, they're called medical-grade, and they cost vastly more than ordinary screws. Want a monitor with a guarantee of zero dead pixels or stuck pixels? The same thing applies.

        You seem to want to hold consumer CPUs to the medical grade standard, without trading off against performance or cost. That just isn't realistic. If you regulate consumer-grade CPUs the way you regulate medical equipment, you kill the consumer CPU industry overnight. Formally-verified CPUs can indeed be made... at incredible expense.

      • (Score: 2) by maxwell demon on Tuesday January 02 2018, @10:20PM (1 child)

        by maxwell demon (1608) on Tuesday January 02 2018, @10:20PM (#616926) Journal

        OK, Company A produces wooden pedestrian bridges, advertised and sold as pedestrian bridges. Company B builds railroads and uses one of Company A's wooden pedestrian bridges as railroad bridge. The moment the first train drives over that bridge, it crashes down. Is it now Company A's fault that the bridge didn't withstand the weight of the train?

        --
        The Tao of math: The numbers you can count are not the real numbers.
        • (Score: 0) by Anonymous Coward on Wednesday January 03 2018, @05:02PM

          by Anonymous Coward on Wednesday January 03 2018, @05:02PM (#617214)

          No, it's Obama's fault.

    • (Score: 1, Informative) by Anonymous Coward on Tuesday January 02 2018, @10:06AM

      by Anonymous Coward on Tuesday January 02 2018, @10:06AM (#616675)

      to show there is a hardware bug, you must show that the hardware was designed to prevent that attack.

      Pedantic. A design error [securityfocus.com] is commonly called a bug, for these KAISER patches to exclude AMD [lkml.org] must mean there's something much more serious here...

      The AMD microarchitecture does not allow memory references, including speculative references, that access higher privileged data when running in a lesser privileged mode when that access would result in a page fault.