Thanks!Essentially, the vulnerability resides in Intel Processors ability to 'speculate' as to what code needs to be executed next, and execute it in advance so that it is cached and ready for the real execution. The vulnerability allows for the security context of that code execution to escalate from user land (referred to as ring 3) to kernel land (referred to as ring 0). The significance is that the Kernel memory houses sensitive information on the system that, once read, can be leveraged to escalate privileges. Double mapping adds an additional buffer between the kernel and user, which mitigates but doesn't completely solve the vulnerability. That is why additional 'tweaks' are necessary in 10.13.3.
I am still on Yosemite...
Is the issue gonna hit me too?
But wtf, no update for Sierra & El Cap at least?
Blame Intel. Apple was probably under NDA, but they decided to release the patch as soon as they can.In my opinion Apple is having some issue with transparency. Why not addressing fixes like this or actions like the battery management more openly? Many things might be good decisions or actions from a content perspective, but not well explained in the first place.
What about El Capitan and Sierra?
Am I correct in reading that the flaw was patched in these security updates (for El Cap, Sierra and HSierra)?:
https://support.apple.com/en-gb/HT208331
Or were these other, unrelated, patches?
--
Quoted from that page:
CVE-2017-13862: Apple
CVE-2017-13867: Ian Beer of Google Project Zero
CVE-2017-13833: Brandon Azad
CVE-2017-13876: Ian Beer of Google Project Zero
CVE-2017-13855: Jann Horn of Google Project Zero
CVE-2017-13865: Ian Beer of Google Project Zero
CVE-2017-13868: Brandon Azad
CVE-2017-13869: Jann Horn of Google Project Zero
CVE-2017-7154: Jann Horn of Google Project Zero
I have an older mac that I still use and its on 10.9 Mavericks... I need it for something important and I can not update it. Will it get a security patch?
Do you has $29?I'd still replace my battery just to be sure![]()
They're similar bugs (many even from the same researcher: Jann Horn), but they are not the bugs being discussed today. These are the CVE IDs for the new vulnerabilities, and none are mentioned in that support document as of now:
(Note that Apple's products may not be vulnerable to all three of those, but we do know they're vulnerable to at least one of them.)
- CVE-2017-5754 (for "Meltdown")
- CVE-2017-5753 and CVE-2017-5715 (for "Spectre")
Apple does sometimes update support pages like that one later with additional details, once public disclosure dates have passed, so it could be that the security update did include patches for these CVEs even if they're not listed there yet. (They've already done that on this page for unrelated updates, listing some more fixes on 12/21.)
The disclosure date for these bugs was supposed to have been January 9, but details leaked early. It might be that Apple would have updated that support page on the 9th to mention the other patches. Given details have leaked, I'd expect them to update it ASAP now if those CVEs were patched.
It would be interesting to perform benchmark tests on Windows VM's running in Parallels and VMware on a Mac before and after the OS is updated with the patch.Exactly, sorry I forgot about those. Yes, VMs are actually the most hardest hit. For OS X users, that'd be running Fusion or Parallels.
It would be interesting to perform benchmark tests on Windows VM's running in Parallels and VMware on a Mac before and after the OS is updated with the patch.
Yeah I'm really curious too! Can someone verify the wallpaper? I know its not the topic.What’s the wallpapers they used in that picture?
What about El Capitan and Sierra?
Yes, it was fixed (at least partially, read the full document to have more infos)
on Dec 6th as you can read here
https://support.apple.com/en-us/HT208331
P.s. Sorry it was already posted , I saw it just now
Better two than none..... I don't know how to delete it this post
Came here to post this ^ The CVE’s listed on Apple’s latest security patch aren’t the exact one’s listed by Google, and the descriptions are also different. Unless Apple explicitly states that the last patch did indeed help mitigate Meltdown/Spectre issues, my organization’s treating this as ‘unpatched’ on Macs.
The question is...why are Apple being so slow to officially announce this is fixed?Quite, my thoughts exactly after tracking down each source of a claimed fix to that single Tweet claiming that Apple had fixed the problem.
The Kernel changes quoted seemed to match the existing stated CVEs and may or may not impact Spectre or Meltdown at all.
I'm assuming nothing until there's a proper statement from Apple.