There is another issue waiting to get attention. Remember the DRAM 'Rowhammer' vulnerability few years ago? It is believed to be fixed by BIOS updates but there is new version available now https://arxiv.org/abs/1710.00551jonha wrote:And, as you wrote in another post, who know what lurks under the surface.
Impact of Meltdown and Spectre CPU security vulnerabilities on VirtualBox virtualization?
-
- Posts: 89
- Joined: 27. Dec 2012, 01:20
- Primary OS: MS Windows 10
- VBox Version: PUEL
- Guest OSses: Windows 10 64-bit
- Location: Czech Republic
Re: Impact of Meltdown and Spectre CPU security vulnerabilities on VirtualBox virtualization?
-
- Oracle Corporation
- Posts: 2973
- Joined: 19. Dec 2007, 15:45
- Primary OS: MS Windows 7
- VBox Version: PUEL
- Guest OSses: Any and all
- Contact:
Re: Impact of Meltdown and Spectre CPU security vulnerabilities on VirtualBox virtualization?
I'm sure courts will have to decide that.jonha wrote:Well... apparently the first information about Meltdown/Spectre trickled down to Intel, AMD etc sometime in June 2017. I fully see that analysis of the problems, establishing viable routes to mitigating or resolving these abuses and bugs etc etc takes a lot of time. However. short notice still sounds a bit rich, I'd say, if you look at the way Intel and others have rushed out microcode updates (and these only for some CPUs!) that seem not very well tested, to say the least. Either they have been sleepwalking into this or they are criminally negligent. Probably both.
The real problem for user and for us is that given the nature of the vulnerabilities, the mitigations require a lot of moving parts. I suspect that it took Intel some time to determine that the problem is not fixable in microcode and that OS vendors need to do something too. I don't know how long it takes Intel to design/develop/test/release a microcode update; I'm guessing it takes time. The OS changes are definitely non-trivial and took probably at minimum a month to implement and longer to test/deploy. The security embargo does not make things easier because wider testing was impossible.
The microcode dependency is pure evil from a deployment perspective. A lot of the mitigations only kick in with updated microcode in place (it adds new CPUID bits and new MSRs), but you can't test anything until you actually have the microcode, and a lot of users don't (either because of Intel or their OEM). And because effectively all CPU models are affected, and for many of them the updates simply don't exist, it means the testing will continue as we go.
What makes Spectre/Meltdown special is that it's a hardware problem and that essentially everything is affected. Intel has to release microcode updates for 20+ CPU families -- I'm not sure that's something that ever happened before.
-
- Oracle Corporation
- Posts: 2973
- Joined: 19. Dec 2007, 15:45
- Primary OS: MS Windows 7
- VBox Version: PUEL
- Guest OSses: Any and all
- Contact:
Re: Impact of Meltdown and Spectre CPU security vulnerabilities on VirtualBox virtualization?
Love this part: "Finally, we abuse Intel SGX to hide the attack entirely from the user and the operating system"Petr Vones wrote:There is another issue waiting to get attention. Remember the DRAM 'Rowhammer' vulnerability few years ago?
-
- Posts: 89
- Joined: 27. Dec 2012, 01:20
- Primary OS: MS Windows 10
- VBox Version: PUEL
- Guest OSses: Windows 10 64-bit
- Location: Czech Republic
Re: Impact of Meltdown and Spectre CPU security vulnerabilities on VirtualBox virtualization?
FYI Lenovo has changed BIOS update availability status for almost all devices to Target availability TBD from previous already particular date announced and many of them returned to Researching stage. It seems as patching the issue is more complex task than expected.
-
- Posts: 89
- Joined: 27. Dec 2012, 01:20
- Primary OS: MS Windows 10
- VBox Version: PUEL
- Guest OSses: Windows 10 64-bit
- Location: Czech Republic
Re: Impact of Meltdown and Spectre CPU security vulnerabilities on VirtualBox virtualization?
As expected, the real fix is possible by hardware (CPU) upgrade only: Intel will release "in-silicon" fixes for Meltdown and Spectre this year