Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

MacRumors

macrumors bot
Original poster
Apr 12, 2001
68,179
38,959



Intel, Google, and Microsoft today disclosed a new variant of the Spectre design flaw and security vulnerability that impacts millions of computers and mobile devices from a range of manufacturers.

Called Variant 4, or the Speculative Store Bypass, the vulnerability is similar to Spectre, taking advantage of the speculative execution mechanism of a CPU to allow hackers to gain access to sensitive information. Variant 4 was demonstrated by researchers in a language-based runtime environment.

meltdownspectre-800x499.jpg
CVE-2018-3639 - Speculative Store Bypass (SSB) - also known as Variant 4

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
According to Intel, the new vulnerability has a "moderate" severity rating because many of the exploits that it uses have already been addressed through mitigations that were first introduced by software makers and OEMs in January for Meltdown and Spectre. Intel is, however, releasing a full mitigation option that will "prevent this method from being used in other ways."

This additional mitigation for Variant 4 has been delivered in beta form to OEM system manufacturers and system software vendors, and Intel is leaving it up to its partners to decide whether or not to implement the extra measures. Intel plans to leave the mitigation set to off by default because of the potential for performance issues.
This mitigation will be set to off-by-default, providing customers the choice of whether to enable it. We expect most industry software partners will likewise use the default-off option. In this configuration, we have observed no performance impact. If enabled, we've observed a performance impact of approximately 2 to 8 percent based on overall scores for benchmarks like SYSmark(R) 2014 SE and SPEC integer rate on client1 and server2 test systems.
The Spectre and Meltdown family of vulnerabilities affect all modern processors from Intel, ARM, and AMD, but Intel has faced more scrutiny over the design flaw due to its high-profile position in the processor market. Apple's iOS and Mac devices are affected by these vulnerabilities, but Apple has historically been quick to patch them.

Prior to when Spectre and Meltdown were initially discovered, for example, Apple had already implemented some patches and has since addressed known Meltdown and Spectre vulnerabilities with little impact to performance on Macs or iOS devices. As mentioned above, many of the exploits in Variant 4 have been previously addressed by Apple and other manufacturers in already-existing software patches.

Spectre and Meltdown-related vulnerabilities are hardware-based and therefore must be mitigated rather than outright fixed, but future Intel chips will not be as vulnerable. Intel has said that its next-generation Xeon Scalable processors (Cascade Lake) and its 8th-generation Intel Core processors will feature redesigned components to protect against some Spectre and Meltdown flaws.

Article Link: Intel Discloses New 'Variant 4' Spectre-Like Vulnerability
 
  • Like
Reactions: LarryF12
Always amusing how nerds make such a huge attention play with their naming of bugs, flaws, exploits etc and graphics that go along with them. DRAMA! DRAMA! Couldn't they just be grown ups? Don't talk down to people as if they're in kindergarten, along with your cutesey, overly-rounded, totally redundant logos of ghosts etc; people aren't (all) morons.
 
Always amusing how nerds make such a huge attention play with their naming of bugs, flaws, exploits etc and graphics that go along with them. DRAMA! DRAMA! Couldn't they just be grown ups? Don't talk down to people as if they're in kindergarten, along with your cutesey, overly-rounded, totally redundant logos of ghosts etc; people aren't (all) morons.
Uh, 99% of the people who own affected products have no idea what Meltdown or Spectre are, or how a processor works to begin with. I think it's just fine to develop a way of explaining the exploits that meets the level of understanding that said users have.
 
It’s really time for Apple to switch to AMD. It’s not like anyone buys a Mac to play AAA games at max settings anyway, which is about the only place left where Intel still has a slim advantage. Not to mention, the MacBooks might get a decent integrated GPU.
 
  • Like
Reactions: femike and simonmet
I think Intel should at least release mitigations for all Core microarchitecture CPUs.

And motherboard manufacturers and OEMs should provide the corresponding BIOS updates.
 
  • Like
Reactions: liberte1776
I always find it terribly amusing that the parties responsible for whatever catastrophe-of-the-month (technological vulnerabilities, environmental damage, societal malfeasance) are ostensibly the only ones who can repair the damage.

giphy.gif


Then they get to swoop in and play the savior. :rolleyes:

And we're supposed to be thankful. o_O
 
AMD is providing patches back to Bulldozer. Similarly to Intel, I think they should go back to at least K10.
 
I really wish Intel and 3rd party board manufactures would release the microcode for BIOS updates for older boards. My 4960X, which is a 4.5 year old $1,000 CPU is unprotected from these security threats because ASUS refuses to release a BIOS update.

I shouldn't have to buy a new motherboard every 2 years just to continue receiving BIOS updates.
 
I agree. This indicates that there are more potential vulnerabilities to be uncovered.

They've already uncovered 2 other potential ones since the original round. It's an issue in most chip tech and not something they're going to be able to fix quickly. It'll be some years most likely.

Even if Apple announces new Macs at WWDC, they will still hold these vulnerabilities, no matter how new the chips in them are. The upside is that most of these impact mostly those running virtual machines, which isn't most day to day users. They're far larger issues for virtual hosting companies and large companies in most cases. The average consumer has little to worry about.
 
There is Spectre in SPARCv9.

Some MIPS have Spectre.

RISC-V has nothing so far.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.