Guru3D.com
  • HOME
  • NEWS
    • Channels
    • Archive
  • DOWNLOADS
    • New Downloads
    • Categories
    • Archive
  • GAME REVIEWS
  • ARTICLES
    • Rig of the Month
    • Join ROTM
    • PC Buyers Guide
    • Guru3D VGA Charts
    • Editorials
    • Dated content
  • HARDWARE REVIEWS
    • Videocards
    • Processors
    • Audio
    • Motherboards
    • Memory and Flash
    • SSD Storage
    • Chassis
    • Media Players
    • Power Supply
    • Laptop and Mobile
    • Smartphone
    • Networking
    • Keyboard Mouse
    • Cooling
    • Search articles
    • Knowledgebase
    • More Categories
  • FORUMS
  • NEWSLETTER
  • CONTACT

New Reviews
Razer Leviathan V2 gaming soundbar review
Guru3D NVMe Thermal Test - the heatsink vs. performance
EnGenius ECW220S 2x2 Cloud Access Point review
Alphacool Eisbaer Aurora HPE 360 LCS cooler review
Noctua NH-D12L CPU Cooler Review
Silicon Power XPOWER XS70 1TB NVMe SSD Review
Hyte Y60 chassis review
ASUS ROG Thor 1000W Platinum II (1000W PSU) review
ASUS ROG Rapture GT-AXE11000 WIFI6E router review
Backforce One Plus Gaming Chair review

New Downloads
AMD Radeon Software Adrenalin 22.6.1 Windows 7 driver download
ReShade download v5.2.2
HWiNFO Download v7.26
7-Zip v22.00 Download
CrystalDiskInfo 8.17 Download
GeForce 516.40 WHQL driver download
Intel ARC graphics Driver Download Version: 30.0.101.1736
AMD Radeon Software Adrenalin 22.5.2 WHQL driver download
Corsair Utility Engine Download (iCUE) Download v4.24.193
Intel HD graphics Driver Download Version: 30.0.101.1994


New Forum Topics
NVIDIA RTX 40 Series Might Get 800 Watts TBP FSR Thread Windows 11 will now tell whether your computer is DirectStorage capable. Ryzen 7000X3D with 100 MB of cache already planned for this year [3rd-Party Driver] Amernime Zone Radeon Insight 22.5.1 WHQL Driver Pack (Released) Info Zone - gEngines, Ray Tracing, DLSS, DLAA, TSR, FSR, XeSS, DLDSR etc. Extreme 4-Way Sli Tuning Up to 96 cores and 12 DDR5 memory channels with AMD Zen4-based server processors. Display Driver Uninstaller Thread 10850k or 10900kf - which is better bin?




Guru3D.com » News » Google: Vulnerabilities affect many CPUs, including those from AMD, ARM, and Intel

Google: Vulnerabilities affect many CPUs, including those from AMD, ARM, and Intel

by Hilbert Hagedoorn on: 01/04/2018 10:46 AM | source: | 10 comment(s)
Google: Vulnerabilities affect many CPUs, including those from AMD, ARM, and Intel

Google posted a thing or two on their security blog today, explaining more about the CPU vulnerability the names involved and the effects. Last year, Google’s Project Zero team discovered serious security flaws caused by “speculative execution,” a technique used by most modern processors (CPUs) to optimize performance.

The Project Zero researcher, Jann Horn, demonstrated that malicious actors could take advantage of speculative execution to read system memory that should have been inaccessible. For example, an unauthorized party may read sensitive information in the system’s memory such as passwords, encryption keys, or sensitive information open in applications. Testing also showed that an attack running on one virtual machine was able to access the physical memory of the host machine, and through that, gain read-access to the memory of a different virtual machine on the same host.

These vulnerabilities affect many CPUs, including those from AMD, ARM, and Intel, as well as the devices and operating systems running on them.

As soon as we learned of this new class of attack, our security and product development teams mobilized to defend Google’s systems and our users’ data. We have updated our systems and affected products to protect against this new type of attack. We also collaborated with hardware and software manufacturers across the industry to help protect their users and the broader web. These efforts have included collaborative analysis and the development of novel mitigations. We are posting before an originally coordinated disclosure date of January 9, 2018 because of existing public reports and growing speculation in the press and security research community about the issue, which raises the risk of exploitation. The full Project Zero report is forthcoming 

A list of affected Google products and their current status of mitigation against this attack appears here. As this is a new class of attack, our patch status refers to our mitigation for currently known vectors for exploiting the flaw. The issue has been mitigated in many products (or wasn’t a vulnerability in the first place). In some instances, users and customers may need to take additional steps to ensure they’re using a protected version of a product. This list and a product’s status may change as new developments warrant. In the case of new developments, we will post updates to this blog.

  • All Google products not explicitly listed below require no user or customer action.
  • Android
    • Devices with the latest security update are protected. Furthermore, we are unaware of any successful reproduction of this vulnerability that would allow unauthorized information disclosure on ARM-based Android devices.
    • Supported Nexus and Pixel devices with the latest security update are protected.
    • Further information is available here.
  • Google Apps / G Suite (Gmail, Calendar, Drive, Sites, etc.):
    • No additional user or customer action needed.
  • Google Chrome
    • Some user or customer action needed. More information here.
  • Google Chrome OS (e.g., Chromebooks):
    • Some additional user or customer action needed. More information here.
  • Google Cloud Platform
    • Google App Engine: No additional customer action needed.
    • Google Compute Engine: Some additional customer action needed. More information here.
    • Google Kubernetes Engine: Some additional customer action needed. More information here.
    • Google Cloud Dataflow: Some additional customer action needed. More information here.
    • Google Cloud Dataproc: Some additional customer action needed. More information here. 
    • All other Google Cloud products and services: No additional action needed.
  • Google Home / Chromecast:
    • No additional user action needed.
  • Google Wifi/OnHub:
    • No additional user action needed.
Multiple methods of attack
To take advantage of this vulnerability, an attacker first must be able to run malicious code on the targeted system. The Project Zero researchers discovered three methods (variants) of attack, which are effective under different conditions. All three attack variants can allow a process with normal user privileges to perform unauthorized reads of memory data, which may contain sensitive information such as passwords, cryptographic key material, etc.

In order to improve performance, many CPUs may choose to speculatively execute instructions based on assumptions that are considered likely to be true. During speculative execution, the processor is verifying these assumptions; if they are valid, then the execution continues. If they are invalid, then the execution is unwound, and the correct execution path can be started based on the actual conditions. It is possible for this speculative execution to have side effects which are not restored when the CPU state is unwound, and can lead to information disclosure.

There is no single fix for all three attack variants; each requires protection independently. Many vendors have patches available for one or more of these attacks.

We will continue our work to mitigate these vulnerabilities and will update both our product support page and this blog post as we release further fixes. More broadly, we appreciate the support and involvement of all the partners and Google engineers who worked tirelessly over the last few months to make our users and customers safe.







« ZOTAC Magnus and ZBOX C Gaming Desktops with 8th Gen Core Processors · Google: Vulnerabilities affect many CPUs, including those from AMD, ARM, and Intel · Far Cry 5: New Gameplay in Holland Valley »

Related Stories

Google: Antivirus Scanners are Pretty Much Useless - 11/18/2016 10:39 AM
Google’s senior security engineer Darren Bilby has stated virus scanners are pretty much useless and that the advice users receive on safe internet use is “horrible”. Thi...

Google: We Contributed $80 Billion To US Economy - 07/03/2012 11:09 AM
In a blog post, posted by

A case for Google: Cloud and Beyond - 04/09/2010 03:38 PM
Since will either fail or succeed. The ChromeOS Site has an interesting article/debate over ChromeOS and how Cloud will change the way we look at computers, an interesting read....


2 pages 1 2


Brutalix
Junior Member



Posts: 15
Joined: 2014-06-02

#5507091 Posted on: 01/04/2018 11:17 AM
This press release is a bit unclear.
Dwagner summed up all the press releases pretty concise in another forum:

* "Meltdown" clearly affects only Intel CPUs, and allows writing trivial (as in "2-hours coding excercise") exploits where user space code can read arbitrary kernel space data. Expect exploits coming in quickly from every script kid and part time criminal on the Internet. There is good reason why Amazon and MicroSoft haste to force-patch-and-reboot all their "cloud" systems.

* The performance-lowering KPTI work-around addresses "Meltdown", only

* Performance penalty of KPTI largely depends on the number of context switches per second, the more, the worse.

* "Spectre" theoretically affects any CPU that implements speculative execution, but exploits are hard to write, artificial examples have been demonstrated as carefully crafted binaries and JavaScript code, they require that the attacker has some interface to the vicitim that allows him to make the victim execute selected instruction sequences with input parameters controlled by the attacker (that is a given for JavaScript code in browsers and guest code in VMs


Much more easy to understand in my opinion.

Kind regards
B.

Asgardi
Senior Member



Posts: 247
Joined: 2010-11-13

#5507158 Posted on: 01/04/2018 02:58 PM
Great that android "has" a patch already. Even greater if people could actually get it for their devices.

Xserces
Junior Member



Posts: 3
Joined: 2017-12-19

#5507164 Posted on: 01/04/2018 03:14 PM
And how will they push this security update on older phones? If you have LG google cant just push some patch without LG saying OK? or im mistaking?

X7007
Senior Member



Posts: 1734
Joined: 2003-07-21

#5507268 Posted on: 01/04/2018 07:06 PM
So AMD is effected or not ? the 1950x TR4 and such ?

Yxskaft
Senior Member



Posts: 1486
Joined: 2011-02-17

#5507272 Posted on: 01/04/2018 07:11 PM
Feels good that I just got my act together during the weekend and installed LineageOS on my devices that stopped getting updates more than one year ago.

2 pages 1 2


Post New Comment
Click here to post a comment for this news story on the message forum.


Guru3D.com © 2022