Meltdown and Spectre

maddog's Doghouse

Article from Issue 208/2018
Author(s):

A serious security problem requires your attention.

I was lying in my bed in the early morning of January 3rd, 2018 when a tweet woke me from my sleep; not a tweet from a bird (nor from the president of the United States), but a tweet from a security researcher discussing two rather bad hardware issues with a large number of CPU chips.

These issues, now known as "Meltdown" and "Spectre," have been rocking the computing world for the past couple of days. Unlike many other security exploits, these are not really "fixable" by a simple software patch, are not operating-system specific, and cannot be avoided by telling your mother not to post her password on her computer screen.

Both have to do with modern hardware architecture and an issue called "out-of-order instruction execution," used to speed up the processor. Sometimes this feature is used to fetch instructions on both sides of a branch (both the "true" and the "false" side), so as soon as the condition is known, the instructions are ready to execute. Access to this "pre-fetched" data could allow a carefully crafted user-level program to access kernel memory, and once that happens, any data on the machine is vulnerable to be read, including passwords, security certificates, and so forth.

[...]

Use Express-Checkout link below to read the full article (PDF).

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News