Безпека

Spectre and Meltdown Difference

Spectre and Meltdown Difference

Understanding Spectre and Meltdown Differences

The year 2018 started with a bombshell news for IT security industry. The industry learned that a series of vulnerabilities named Spectre and Meltdown is going to affect all high-end microprocessors produced in the last 20 years. The vulnerabilities were discovered by researchers almost six months ago. Security threats are nothing new for the IT industry. However, the scope of these new threats is astounding. From the personal computer to the enterprise-level clouds, every high-end microprocessor is at risk. And the problems are hardware-related, so they are more difficult to fix.

The Cause of Spectre and Meltdown

Malicious programs can exploit Spectre and Meltdown to gain access to privileged data. They gain this access by taking advantage of speculative execution and caching. Here are the concepts that are in play:

The Spectre and Meltdown vulnerabilities are exposed due to the complex interaction of these ideas. Processes aren't able to access information of other processes without permission in protected memory. But due to the way modern microprocessor caches are designed, it's possible for a process to read the information stored in the cache by the speculative execution tasks without any permission approval. A more detailed description of the vulnerabilities is available from the Project Zero team from Google.

Spectre and Meltdown Differences

The issues have been documented as three variants:

The variants 1 and 2 are grouped together as Spectre. The variant 3 is called Meltdown. Here are key points about the threats:

Spectre

Threat: Exploiting information from other running processes.

Processors Affected: Processors from Intel, AMD and ARM are under threat.

Remedy: Manufacturers and software vendors are working on updates. Spectre is considered a harder threat to solve than Meltdown. The most likely use of Spectre would be using JavaScript to access data about browser sessions keys, passwords etc. Users should regularly update their Internet Explorer, Firefox, Chrome and Safari browsers besides other online applications.

Meltdown

Threat: Reading data from private kernel memory without permission.

Processors Affected: Processors from Intel and ARM. AMD processors are not affected.

Remedy: Patches has been released for Windows and Linux. MacOS has been patched since 10.13.2 and iOS since 11.2. According to Intel, OS updates should be enough to mitigate the risk, no need for firmware updates.

Looking Ahead

Spectre and Meltdown are long-term problems. Nobody is sure if the vulnerabilities have already been exploited. It's important that you keep all of your OS and software up-to-date to minimize the risk of exposure.

Further Reading:

References:
5 найкращих аркадних ігор для Linux
В наш час комп’ютери - це серйозні машини, що використовуються для ігор. Якщо ви не можете отримати новий високий бал, ви зрозумієте, що я маю на уваз...
Битва за Веснот 1.13.6 Розробка випущена
Битва за Веснот 1.13.6, випущений минулого місяця, є шостим випуском розробки в 1.13.x, і це забезпечує низку вдосконалень, особливо до інтерфейсу кор...
Як встановити League of Legends на Ubuntu 14.04
Якщо ви шанувальник League of Legends, то це можливість для вас тестувати League of Legends. Зверніть увагу, що LOL підтримується на PlayOnLinux, якщо...