Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
In practice, reading 32 gigs of some random persons system memory over a 5 megabit DSL line or 15 megabit cable line (about average for high speed internet locally) would be a really slow and ineffective way of hacking a system by reading the entire contents of memory.

Nobody will do that. You read memory locally and send back only interesting data. Or just use data locally too (for elevated privileges for example). Slow internet connection does not protect you.
 
  • Like
Reactions: RandomDSdevel
Most of the public is not aware but far more severe vulnerabilities than this get patched every time there's a security update for macOS / Windows / iOS / Linux / Whatever. They just don't get as much publicity. That lack of publicity is a good thing, as misunderstanding the nature of zero-day vulnerabilities could lead to panic.
I agree and when people whine about a lack of "changelogs" or very minimal, they act annoyed. Well, one reason why they don't disclose too many details is it can give away vague details about an exploit that the vendor (Apple, MS, etc) found internally or were notified about privately and since many don't update or wait to update, it could leave them open to the exploit in case someone figures out what is 'broken' based on the changelog info.
 
Technically "Apple CPUs" are not made by Apple. They are ARM chips designed by TSMC and Samsung and are affected by both Meltdown and Spectre.

no, they are not designed by TSMC and Samsung. TSMC and Samsung are handed a gdsii or OpenAccess database that says "draw a polygon at these coordinates on poly silicon. Now draw a polygon at these coordinates on M1." Neither TSMC nor Samsung likely have any idea how the circuits on the A-series processors even work.
 
The question looming here is, will those MacOS patches be backported to Sierra down to Mavericks, or even if supported, Mountain Lion? We already know that previous versions of iOS and tvOS are not going to have this patch, so they're stuck.. but what of MacOS?

BL.


Yes they were. Refer to newly disclosed bugs fixed in December security patch here: https://support.apple.com/en-gb/HT208331
 
  • Like
Reactions: RandomDSdevel
no, they are not designed by TSMC and Samsung. TSMC and Samsung are handed a gdsii or OpenAccess database that says "draw a polygon at these coordinates on poly silicon. Now draw a polygon at these coordinates on M1." Neither TSMC nor Samsung likely have any idea how the circuits on the A-series processors even work.
Then they are still designed by TSMC and Samsung. I believe Samsung and TSMC knows more than you give them credit for.
 
  • Like
Reactions: RandomDSdevel
Then they are still designed by TSMC and Samsung. I believe Samsung and TSMC knows more than you give them credit for.
What are you talking about? How are they "designed" by TSMC and Samsung when all TSMC and Samsung do is build it exactly the way Apple tells them to? Apple determines how many transistors to use, the size and shape of each, and the size and shape of each layer of metal that connects them together, and provides a layer by layer blueprint that is plugged into the machinery at the fab and used directly by those machines to produce the chip. If I draw blueprints for a house and hand it to a building contractor, the building contractor didn't "design" the house. If I provide a file to a computerized machining tool telling it exactly where to remove metal from a machined part, the machine didn't "design" the part.

And you are wrong - I've taped out dozens of CPUs to fabs, and I know exactly what information is provided to the fab. How many have you taped out?
 
What about older Apple iDevices that are no longer receiving updates, are they now totally obsolete now due to this vulnerability?
 
Is this a realistic threat for iphone users who dont jailbreak and stick to Appstore?
Just curious.
 
What are you talking about? How are they "designed" by TSMC and Samsung when all TSMC and Samsung do is build it exactly the way Apple tells them to? Apple determines how many transistors to use, the size and shape of each, and the size and shape of each layer of metal that connects them together, and provides a layer by layer blueprint that is plugged into the machinery at the fab and used directly by those machines to produce the chip. If I draw blueprints for a house and hand it to a building contractor, the building contractor didn't "design" the house. If I provide a file to a computerized machining tool telling it exactly where to remove metal from a machined part, the machine didn't "design" the part.

And you are wrong - I've taped out dozens of CPUs to fabs, and I know exactly what information is provided to the fab. How many have you taped out?

They are constructed by TSCM and Samsung, therefore TSMC and Samsung do know, to some extent, what they are doing and are not completely blind to the process.
 
  • Like
Reactions: RandomDSdevel
They are constructed by TSCM and Samsung, therefore TSMC and Samsung do know, to some extent, what they are doing and are not completely blind to the process.
They are handed a file with literally billions and billions of polygons in it. That's what they know. That's all they know. They don't know the purpose of any of these polygons unless they spend considerable effort reverse engineering it, inferring a netlist, trying to determine the purpose of each wire, etc. That would cost them millions of dollars of effort. Perhaps they do it, but it seems unlikely and is probably forbidden by the contract they have with apple (reverse engineering is forbidden by standard contracts).
 
  • Like
Reactions: RandomDSdevel
"Our testing with public benchmarks has shown that the changes in the December 2017 updates resulted in no measurable reduction in the performance of macOS and iOS as measured by the GeekBench 4 benchmark, or in common Web browsing benchmarks such as Speedometer, JetStream, and ARES-6."



In the December 2017 updates for all 3 supported operating systems, it seems like Meltdown has already been fixed for Sierra and El Cap too, but the CVE numbers are different which is why people (including me) are still confused because the descriptions of the fixed errors in Sierra and El Cap read like Meltdown. So it's a little unclear what's going on.

https://support.apple.com/en-us/HT208331
-----
Available for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6, OS X El Capitan 10.11.6

Impact: An application may be able to read kernel memory

Description: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.

CVE-2017-5754: Jann Horn of Google Project Zero, Werner Haas and Thomas Prescher of Cyberus Technology GmbH, and Daniel Gruss, Moritz Lipp, Stefan Mangard and Michael Schwarz from Graz University of Technology

Entry added January 4, 2018
-----

Not sure why Apple don't mention support for 12 and 11........
 
  • Like
Reactions: RandomDSdevel
I bet Apple created Spectre and Meltdown to force people into upgrading iOS to slow down their phones to force people to upgrade.

Ho, Ho, Ho, Classic Apple.

Just kidding everyone. Conspiracy theories are fun narratives, aren't they? :D
 
  • Like
Reactions: RandomDSdevel
It's kind of funny how some news sources are making this issue sound like a Mac/iOS only problem. Once you read past the clickbait headline the facts come clearer.

I'm actually going to call you out on this. Show me a link to one of these news sources that headline or byline states it's an Apple ecosystem only. [Note: Using 9To5Mac, Macworld shouldn't count, since it's audience is exclusively driven for that ecosystem]. I mean an Ars Technica, Cnet.
 
  • Like
Reactions: RandomDSdevel
Note that, per the link Juli posted as an update today, Apple has explicitly stated that all three of the actively maintained OS versions (El Capitan, Sierra, and High Sierra) have received the same mitigations against Meltdown.
 
Note that, per the link Juli posted as an update today, Apple has explicitly stated that all three of the actively maintained OS versions (El Capitan, Sierra, and High Sierra) have received the same mitigations against Meltdown.
Apple just edited the document today to correct that. Only 10.13.2 fixes Meltdown.
Available for: macOS High Sierra 10.13.1

Impact: An application may be able to read kernel memory

Description: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.

CVE-2017-5754: Jann Horn of Google Project Zero, Werner Haas and Thomas Prescher of Cyberus Technology GmbH, and Daniel Gruss, Moritz Lipp, Stefan Mangard and Michael Schwarz from Graz University of Technology

Entry updated January 5, 2018
 
I'm actually going to call you out on this. Show me a link to one of these news sources that headline or byline states it's an Apple ecosystem only. [Note: Using 9To5Mac, Macworld shouldn't count, since it's audience is exclusively driven for that ecosystem]. I mean an Ars Technica, Cnet.

http://money.cnn.com/2018/01/04/technology/business/apple-macs-ios-spectre-meltdown/index.html

The headline specifically calls out Mac OS and iOS only. Granted CNN is quoting Apple, but it should have mentioned something about the other OSs.
 
Apple just edited the document today to correct that. Only 10.13.2 fixes Meltdown.

Oh good grief - they made that new change within the past hour! (I was the one who sent that link to Juli - sorry, Juli!)

Of course a lot of this wasn't supposed to be out officially yet, so people are scrambling. I'm still assuming the other two OSes will be getting the patch, because to do otherwise would fundamentally change how Apple has managed OS X / macOS security.
 
https://support.apple.com/en-us/HT208331
-----
Available for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6, OS X El Capitan 10.11.6

Impact: An application may be able to read kernel memory

Description: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.

CVE-2017-5754: Jann Horn of Google Project Zero, Werner Haas and Thomas Prescher of Cyberus Technology GmbH, and Daniel Gruss, Moritz Lipp, Stefan Mangard and Michael Schwarz from Graz University of Technology

Entry added January 4, 2018
-----

Not sure why Apple don't mention support for 12 and 11........
They seem to have changed their mind about the older OS’s now
 
https://support.apple.com/en-us/HT208331
-----
Available for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6, OS X El Capitan 10.11.6

Impact: An application may be able to read kernel memory

Description: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.

CVE-2017-5754: Jann Horn of Google Project Zero, Werner Haas and Thomas Prescher of Cyberus Technology GmbH, and Daniel Gruss, Moritz Lipp, Stefan Mangard and Michael Schwarz from Graz University of Technology

Entry added January 4, 2018
-----

Not sure why Apple don't mention support for 12 and 11........


Huh ... that's very odd - it didn't show up for me late yesterday when the other poster mentioned seeing it! I even did a "Find" for the CVE number and nothing came up. Thanks!

I wonder why the fix wasn't added to the older OSs? (They edited again to take them out)
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.