Arthur T Knackerbracket has found the following story:
Qualcomm has confirmed its processors have the same security vulnerabilities disclosed this week in Intel, Arm and AMD CPU cores this week.
The California tech giant picked the favored Friday US West Coast afternoon "news dump" slot to admit at least some of its billions of Arm-compatible Snapdragon system-on-chips and newly released Centriq server-grade processors are subject to the Meltdown and/or Spectre data-theft bugs.
[...] Qualcomm declined to comment further on precisely which of the three CVE-listed vulnerabilities its chips were subject to, or give any details on which of its CPU models may be vulnerable. The paper describing the Spectre data-snooping attacks mentions that Qualcomm's CPUs are affected, while the Meltdown paper doesn't conclude either way.
[...] Apple, which too bases its iOS A-series processors on Arm's instruction set, said earlier this week that its mobile CPUs were vulnerable to Spectre and Meltdown – patches are available or incoming for iOS. The iGiant's Intel-based Macs also need the latest macOS, version 10.13.2 or greater, to kill off Meltdown attacks.
Google has decided to publicly disclose the well speculated on CPU based security flaw ahead of their original schedule as a response to the rapidly increasing amount of information that is becoming available. It's official: Google was able to construct a PoC that can read kernel memory at a speed around 2000 bytes per second from a user space application. An overview of the situation is available at the Project Zero blog. Despite the AMD Linux kernel patch that disables the existing known mitigation for their processors Google specifically names AMD CPUs as suffering from the flaw along with Intel and ARM.
Linux creator Linus Torvalds has had some harsh words for Intel in the course of a discussion about patches for two bugs that were found to affect most of the company's processors. [...] Torvalds was clearly unimpressed by Intel's bid to play down the crisis through its media statements, saying: "I think somebody inside of Intel needs to really take a long hard look at their CPUs, and actually admit that they have issues instead of writing PR blurbs that say that everything works as designed."
The Finn, who is known for never beating about the bush where technical issues are concerned, questioned what Intel was actually trying to say. "Or is Intel basically saying 'we are committed to selling you shit forever and ever, and never fixing anything'?" he asked. "Because if that's the case, maybe we should start looking towards the ARM64 people more."
What does "immunity" to the "Meltdown" bug mean, and at what cost does it come?
Intel says it has developed and is issuing updates for all types of Intel-based machines that will "render those systems immune from both exploits (referred to as 'Spectre' and 'Meltdown') reported by Google Project Zero. "Intel has already issued updates for the majority of processor products introduced within the past five years," says an Intel spokesperson. "By the end of next week, Intel expects to have issued updates for more than 90 percent of processor products introduced within the past five years."
Intel's reference to "immune" is an interesting twist in this saga. The New York Times reported yesterday that Spectre fixes will be a lot more complicated as they require a redesign of the processor and hardware changes, and that we could be living with the threat of a Spectre attack for years to come. Intel's wording appears to suggest that this isn't the case for its own processors and security fixes.
Intel is facing class action lawsuits over Meltdown:
Just days after The Register revealed a serious security hole in its CPU designs, Intel is the target of three different class-action lawsuits in America.
Complaints filed in US district courts in San Francisco, CA [PDF], Eugene, OR [PDF], and Indianapolis, IN [PDF] accuse the chip kingpin of, among other things, deceptive practices, breach of implied warranty, negligence, unfair competition, and unjust enrichment.
The RISC-V Foundation would like to remind you that RISC-V is not affected.
Previously: Major Hardware Bug Quietly Being Patched in the Open
Patch for Intel Speculative Execution Vulnerability Could Reduce Performance by 5 to 35% [Update: 2]
Don't Expect Intel Chip Recall After Spectre and Meltdown, CEO Says
Original Submission #1 Original Submission #2 Original Submission #3 Original Submission #4 Original Submission #5
(Score: 4, Insightful) by Apparition on Sunday January 07 2018, @11:25PM (27 children)
In the short term, Meltdown and Spectre are PR disasters for Intel, AMD, ARM, Qualcomm, etc. However, in the long term, Spectre is a holiday gift for them all. The only real way to fix Spectre is via new hardware, which will see release in 2019 or 2020. That means new desktop computers for governments and businesses, and new notebook computers, smartphones, and tablets for everyone! Merry Christmas, Happy Hanukkah, and Happy New Year, Intel, AMD, ARM, Qualcomm, Apple, Samsung, Dell, Lenovo, etc.
(Score: 2, Interesting) by Anonymous Coward on Sunday January 07 2018, @11:34PM (6 children)
This is just getting started. Some bright spark last year decided to start fuzzing CPU instructions. This is something the chip manufactures should have been doing. They better get on it ASAFP. Security and tech through obscurity does not work. When everyone learns this lesson yet again. We all get to pay for it. They are going to find more and more just like this for a long time.
This means things like pretty much all new cars have it. Your routers have it. Your internet modems have it. That oh so clever internet connected thermostat will have it. So on and so on. This is going to be *ugly*.
(Score: -1, Offtopic) by Anonymous Coward on Monday January 08 2018, @12:28AM (1 child)
The Kind Rapist. A legend or reality? The answer to that is, as you may have guessed, unconfirmed. You decide.
Rumor has it that there exists a rapist who is unbelievably kind to those he rapes. There are various stories that tell of his kindness. One story states that, after raping and murdering a 9 year old female child, he magnanimously threw a half-eaten lolly pop on the corpse. Another story states that he only beat and raped a woman who casually strolled past him a billion times for her heinous transgressions. Yet another story states that he always rapes with a gentle smile on his face. All of these stories have one obvious commonality, which is that they portray this individual as gentle and merciful, perhaps even as a saint.
The story of The Kind Rapist is sure to live on for many generations. But is it just a story?
(Score: 0) by Anonymous Coward on Monday January 08 2018, @03:41AM
This individual has been repeatedly posting NOISE about body parts and sex with children and such.
Yes, it is "Offtopic".
If that is how you mod it, however, those posts won't get the attention they deserve from the site's staff and the serial abuser will continue to abuse the site.
The correct mod for posts in this continuous stream of noise is SPAM.
-- OriginalOwner_ [soylentnews.org]
(Score: 0) by Anonymous Coward on Monday January 08 2018, @12:42AM (3 children)
The notion that "security by obscurity doesn't work" doesn't mean what you think it means.
It means that if you try to keep your mechanisms secret, you'll probably be compromised. This is because your particular, individual ideas are probably not that smart; it's much better to use mechanisms that have been vetted by very many intelligent people over a lengthy period of time, and which have already been proven under real-world attacks.
The mechanisms of a lock, though public knowledge, are buried obscurely in a metal body.
Your cryptographic key is a number that is so obscure, it's nearly impossible to guess.
(Score: 0) by Anonymous Coward on Monday January 08 2018, @02:44AM (2 children)
I would be money that if you asked a HW eng from intel a few years ago if it is possible they would have said 'nope too hard' 'is it doced?' 'nah doesnt matter its impossible'.
It means exactly what I stated. You are being too narrow and pedantic.
(Score: 0) by Anonymous Coward on Monday January 08 2018, @03:53AM
It appears that you are asking if it is accompanied by a guide. [google.com]
If I was going to shorten the word "documented", I would have done it thusly: doc'd.
You are being too narrow and pedantic.
Heh, and you thought -he- was.
-- OriginalOwner_ [soylentnews.org]
(Score: 0) by Anonymous Coward on Monday January 08 2018, @03:07PM
Got it.
(Score: 4, Informative) by takyon on Sunday January 07 2018, @11:41PM (5 children)
You can get a laptop as thin as a smartphone!
Acer just unveiled the thinnest laptop in the world [bgr.com]
Meanwhile in Chromebook land:
Acer launches a new Chromebook 11 with USB-C [theverge.com]
I can tolerate 1366x768 resolution (for the moment), but 2 GB RAM needs to be eliminated as an option. The only good thing is that there are not any fewer full-sized USB ports to make way for the added USB Type-C ports. That's the way it should be.
Call it a delayed holiday gift for the computer manufacturers. The things they are showing off at CES right now probably have the compromised chips in them, and there's a good chance most people won't notice slowdowns enough to even want to avoid the bug and upgrade in 2 years. In short, no change!
AMD is still a winner in this situation because Spectre has no huge slowdowns associated with it and can be fixed with a firmware update AFAIK:
AMD is big winner from chip flaw fiasco as more than $11 billion in Intel stock value is wiped out [cnbc.com]
If the hit seen on "synthetic benchmarks" translates to a similar/noticeable hit on I/O-heavy datacenter and HPC workloads, AMD has found its way in to actually push Threadripper and Epyc to customers who might not have given them the chance before. They are probably going to try to double the core count of Epyc in the next year or two. Zen was a good punch thrown at Intel, but Meltdown might lead to the knockout.
[SIG] 10/28/2017: Soylent Upgrade v14 [soylentnews.org]
(Score: 3, Informative) by Apparition on Sunday January 07 2018, @11:58PM (1 child)
According to Matt Dillon of Amiga and DragonFlyBSD fame, Spectre can only be fixed by completely new hardware [dragonflybsd.org]. Not to say that he's completely correct, but he knows much more about hardware than I do.
(Score: 0) by Anonymous Coward on Monday January 08 2018, @11:02PM
Spectre still only affects out of order processors.
Meaning that all the In-Order processors are unaffected by it.
If you can stand the performance loss associated with in-order processors, then not only can you save a huge amount of real estate per core, but you also get chips with consistently reproducible behavior and well defined, even if buggy, logic.
This might be an opportunity for some new upstart chip manufacturers to create an ecosystem based around openly documented in-order processors, with chipsets intercompatible between manufacturers as was the case through the clone years of the late 80s to the late 90s for PCs, or much of the 70s/early 80s for kit computers utilizing common busses. If this were to happen it would still cost us more than an equivalent AMD or Intel system, but given the tech advanced today, even something built on much older process technologies could be optimized for both reduced power usage compared to previous designs, as well as better performance per cycle. Avoiding the patent minefield would take some work, but if we crowdsourced that among techies and tech savvy legal nerds, we should be able to map out acceptable/unacceptable technology to a sufficient degree that we could have systems with plug and play support for RISC-V, J-Core, OpenSparc, OpenRisc, and other processors all running off the same motherboards, utilizing a management process similiar to the AMD/ARM/Intel management processors, only with the security key settable by the end user, possibly even using NVRAM of some form to make it effectively infinitely rewritable and simple to clear (which would lose a third party access to your encrypted data without a copy of the key) while allowing you to easily secure your hardware, clear it if the key becomes compromised or if you want to securely wipe it and offer it for a third party's use.
Sounds like a win win if somebodies can pull it off.
(Score: 3, Informative) by arslan on Monday January 08 2018, @05:22AM
Just to add more color to this, according to AMD, their chips are not susceptible to Meltdown and is only susceptible to 1 of the 2 variant of Spectre exploits. And as you said, they also claim that the fix to that causes negligible performance impact. I would think they'd be in a lot of trouble if they are publishing this information with the intention to misled given they're publicly listed, so I'd take their official statement over a "blogger" anytime until proven otherwise:
Here's their official statement [amd.com].
Here's GPZ's categorization of the variants [blogspot.com.au] and how it maps to the code name Meltdown and Spectre.
(Score: 0) by Anonymous Coward on Tuesday January 09 2018, @07:03PM (1 child)
screw EYPC and it's closed source backdoor, PSP
(Score: 2) by takyon on Tuesday January 09 2018, @10:02PM
https://soylentnews.org/article.pl?sid=18/01/07/1037219 [soylentnews.org]
AMD is giving an option to disable PSP. Is Intel doing the same with Management Engine?
[SIG] 10/28/2017: Soylent Upgrade v14 [soylentnews.org]
(Score: 3, Interesting) by Grishnakh on Monday January 08 2018, @12:03AM (7 children)
What I want to know is: are other CPU architectures vulnerable to something like this? x86-64 (and i586 before it, as this goes back to the PPro days) and ARM are vastly different architectures. But I wonder if SPARC or the old DEC Alpha were vulnerable to this kind of thing, or if they were simply better designed for memory security because they came from the "big iron" market where multi-process multi-user systems were the norm, unlike Intel which came from single-user DOS machines and ARM which came from the Acorn microcomputer company and was designed for embedded systems.
(Score: 2) by Grishnakh on Monday January 08 2018, @12:16AM (1 child)
Also, a more current architecture that I'm interested to know about is IBM's POWER chips. A bit of research found that POWER6 does not support out-of-order execution, but I don't know about 7-9.
(Score: 0) by Anonymous Coward on Monday January 08 2018, @02:07AM
Red Hat reports:
(Score: 5, Funny) by driverless on Monday January 08 2018, @12:40AM (1 child)
The 6502 isn't. That's why Cyberdyne used them in the T-800 Terminator.
(Score: 2) by dry on Monday January 08 2018, @09:52PM
The 6502 had enough flaws (jsr when operand is on a page boundary) that you don't want to use it. Luckily there is the 65C02.
(Score: 0) by Anonymous Coward on Monday January 08 2018, @02:52AM
Pretty much any CPU that does speculative execution it is possible for this to happen. Basically if they are trying to retire more than 1 instruction per cycle. So yes if they do that they are candidates for these types of attacks. The older SPARC and Dec Alpha probably not. Even the old intel 486 does not have this issue as it has an in-order execution pipeline. Speculative execution really showed up after about 1995.
(Score: 0) by Anonymous Coward on Monday January 08 2018, @04:42PM (1 child)
SPARC wasn't. They had separate buffers for kernel and user space, so the privilege escalation wouldn't have been possible in the same way.
(Score: 2) by Grishnakh on Tuesday January 09 2018, @12:39AM
Ok, then it sounds like it's time to dust off the SPARC architecture and bring it back. I always liked those SPARCstations anyway, plus the keyboards were pretty nice, a lot better than the garbage we have now.
(Score: 3, Insightful) by frojack on Monday January 08 2018, @12:49AM (5 children)
Not sure this broken window exercise is going to be all that good for anyone in either the long or the short run.
If they have to radically revamp processors, are they not just as likely to induce more errors in the process? Will we all end up spending a lot of money preventing a theoretical risk that we could ameliorate less expensively by simply turning off some of the features in these CPUs?
(Especially in the case of battery powered machines, predictive execution is a huge waste of energy, - speculatively processing along each of several branches in the hopes of having a result ready before the desired branch is actually selected, means you substituted battery energy for a slight time saving).
True, new designs, built from the ground up with security in mind might be somewhat improved (security wise) from the current designs. But with both government and industry looking for and demanding backdoors and built in exploits, we are just as likely to end up with more insecurities than fewer.
These devices are the most complex thing mankind has ever built. To expect anything beyond a mere patching here and there is like expecting to rebuild New York City from the ground up to in the hopes of avoiding the pitfalls of cities. Not going to happen.
No, you are mistaken. I've always had this sig.
(Score: 3, Interesting) by takyon on Monday January 08 2018, @01:26AM (1 child)
Someone can probably come up with a better example, like the Large Hadron Collider. But CPUs are really at the bleeding edge of manufacturing. It's nanotechnology, and subject to quantum effects. And yet we are stuck having them crippled one way or another with security bugs (possibly forgivable) or untrustworthy components (much worse).
RISC-V is gaining traction: Western Digital to Transition Consumption of Over One Billion Cores Per Year to RISC-V [soylentnews.org]
The patching seems to work in both cases. But you have to accept a possible slowdown in some scenarios if you patch for Meltdown.
Are you trying to say that Intel will not remove or correct the features in upcoming generations of hardware? Such as Cannonlake, which may have had its release delayed [macrumors.com] to the end of 2018? That rumor-based story came after Meltdown was known to researchers and doesn't give a solid reason for the delay. Maybe the difficulty is due to redesigning the silicon to avert carrying Meltdown into a new generation rather than the usual lithography yield issues.
If the patches addressing Spectre don't cause any perceptible slowdown, then maybe we will see Intel, AMD, ARM, etc. live with that bug lurking in new hardware for the next 2-3 years.
[SIG] 10/28/2017: Soylent Upgrade v14 [soylentnews.org]
(Score: 1, Informative) by Anonymous Coward on Monday January 08 2018, @04:32AM
this broken window exercise
[...]
new designs, built from the ground up with security in mind
RISC-V
There was an Ask The Green Site story [slashdot.org] the other day on the topic of an Open Hardware core in an effort to leave behind the proprietary vendors who won't even fuzz[1] their damned microcode.
RISC-V was mentioned and seemed as good an answer as anything else suggested.
Bruce Perens had the idea that, with a 100 percent flashable device, these sorts of problems could be reverted without buying any new hardware.
...and noted that devices have come a long way since the slow power-hungry things we think of in this context (FPGAs).
[1] Mentioned by AC#619327 above.
I'm shocked that I haven't seen this mentioned in every single story about these vulnerabilities.
-- OriginalOwner_ [soylentnews.org]
(Score: 0) by Anonymous Coward on Monday January 08 2018, @02:48AM (2 children)
Not sure this broken window exercise is going to be all that good for anyone in either the long or the short run
It is indeed the 'broken window fallacy' However, someone has already tossed a brick through the window.
Remember in the story the glazier benefited from the broken window. I would say his anecdote is true in this case (INTC, QCOM, BCOM, APPL, etc being the glaziers). The rest of the economy however will suffer because of it, the actual lesson of the broken window fallacy.
Remember the fallacy is people talking about stimulating the economy through the use of destruction. In this case however the destruction is a done deal.
(Score: 2) by frojack on Monday January 08 2018, @04:34AM (1 child)
In this case the Glaziers were installing windows with defective glass. They may well have known about it, and assumed nobody would trip to it. Or they may not have known about it. IDK.
I just don't see this as something that is good for the users, or the manufacturers, as the GP suggested.
No, you are mistaken. I've always had this sig.
(Score: 0) by Anonymous Coward on Tuesday January 09 2018, @01:48AM
The version I heard the glaziers would benefit and some boy wanted to break the window. The effect is the same. Society as a whole is worse off while a small group benefit.
The users not so much. But it is not like we are going to collectively stop using computers. We will want our computers fixed. The ones who make computers will be better off as we need their goods. We as users will be worse off because we are replacing something that used to work just fine.
But at this point like I said it is a moot point. Someone has already chucked a brick through the window. So the supposition in the broken window fallacy is already in effect. The fallacy is thinking it is good for everyone not just a select few.
Governments play this game all the time (usually with taxes and deductions). They choose winners and losers in our markets. Usually with the mistaken idea they can make some select few better.