back to article AMD warns of new Meltdown, Spectre-like bugs affecting CPUs

AMD is warning users of a newly discovered form of side-channel attack affecting a broad range of its chips that could lead to information disclosure. Akin to Meltdown and Spectre, the Transient Scheduler Attack (TSA) comprises four vulnerabilities that AMD said it discovered while looking into a Microsoft report about …

  1. gnasher729 Silver badge

    From all I read, this is a class of bugs that could happen on an Apple Mx chip as well, but I never saw this mentioned. What is the reason?

    0. Doesn’t happen on M1-M4

    1. Nobody ever tried.

    2 Apple doesn’t care.

    3. Apple has the same costly workarounds but doesn’t tell anyone.

    4. By design or luck the workarounds are cheaper, say 4% instead of 20%.

    5. The OS runs critical software on one fully protected core, or one an efficiency core, and as long as you use the OS code you are safe.

    I’d bet on 0. or more likely 5., especially since the low power cores should be safe, and you should be able to use up to six of them.

    1. Bela Lubkin

      Surely it is 1A: nobody ever tried, as this is a new public release of information about specific techniques. Whether Apple (or Intel, or any other CPU manufacturer) will try it on their own hardware is up to them. 3rd party security researchers may do so as well. In cases like this it is definitely not as simple as 'compile and test'; one must thoroughly understand the target CPU design in order to create attacks based on the same concept, but targeted to the actual facilities at hand.

    2. Andrew Hodgkinson

      This class of bugs does include some kinds of Apple Silicon core, but as in all cases it varies from core to core, regardless of instruction set.

      * https://predictors.fail

      * https://www.tomshardware.com/tech-industry/cyber-security/apple-silicon-is-vulnerable-to-side-channel-speculative-execution-attacks-flop-and-slap

    3. ForthIsNotDead
      Coat

      Or:

      6. Apple says it's none of your business, since your property is their property.

    4. iron

      > I’d bet on 0. or more likely 5

      Lol, I'd bet on numbers 1 - 3. Most likely no 3.

  2. Ken Hagan Gold badge

    only?

    "AMD said it could only be carried out by an attacker able to run arbitrary code on a target machine."

    So, bad news for any cloud providers out there then, whose line of business is literally letting third parties run arbitrary code on their machines.

    1. alkasetzer

      Re: only?

      Well, most of the cpu issues found recently are mostly problematic for cloud operators and even then only if you share the servers between clients (which is often).

      As for running random stuff on the desktop, yeah, that happens all the time (one has to install stuff to work or play or wtv).

      These days as long i'm not part of a botnet I don't know what is the difference between having my data at third parties because i use google/apple/ms services or bad operators...

      1. O'Reg Inalsin Silver badge

        Re: only?

        Some of those kinds of bugs can be abused from js running in a browser. Proof of concept has been done.

        1. Ace2 Silver badge

          Re: only?

          “ In AMD's view, the TSAs affecting its chips are not exploitable via malicious websites, and would need to be executed many times in order to reliably exfiltrate any data.”

        2. Kevin McMurtrie Silver badge

          Re: only?

          It sounds like this requires concurrent operations to happen, and the extraction rate is low. That would be with a native app can be tuned to match a specific CPU's internal timing. WebAssembly is not so precise and it may effectively drop the extraction rate to zero.

          At this point I'm thinking that attack detection is becoming increasingly valuable. Mitigations always have a cost. Even a flawless CPU is paying a little performance penalty from the factory to prevent attacks.

        3. gnasher729 Silver badge

          Re: only?

          And after the proof of concept code, Apple and everyone else changed their browser code that is supposed to report the exact time. So you can’t get the exact time either nanoseconds precision anymore, but these attacks are stopped.

    2. Anonymous Coward
      Anonymous Coward

      Re: only?

      "So, bad news for any cloud providers out there then, whose line of business is literally letting third parties run arbitrary code on their machines."

      Assuming you're referring to VMs on cloud providers then no, third parties are *not* running arbitrary code (directly) on the cloud providers (physical) machines - VM hypervisors (selected by the cloud providers) are running on the cloud provider's physical machines and then 3rd party OSes (i.e. Linux distros) are running inside VMs managed by those hypervisors rather than (directly) on the physical machines.

  3. Healeyman

    Solution?

    JFC, how is a humble laptop user supposed to do an embedded firmware update on a CPU? Lowest I've ever gone is flashing a BIOS, and that was hairy enough. Where do you get the updated firmware?

    1. Anonymous Coward
      Anonymous Coward

      Re: Solution?

      It'll be a BIOS flash (which in experience is fairly trivial), delivered by the laptop manufacturer.

      1. Steve Jackson

        Re: Solution?

        If….they deem you important enough to get one….

        1. werdsmith Silver badge

          Re: Solution?

          If….they deem you important enough to get one….

          Or if I deem the problem important enough to bother with it.

          Actually I don't want any patch that decreases the CPU performance when there is negligible risk. I will avoid it if I get the choice.

          1. gnasher729 Silver badge

            Re: Solution?

            You wouldn’t need it on a MacBook that is exclusively used by you. So any malware on it is stuff you installed yourself somehow and such malware would be easier than making Spectre work reliably.

        2. J. Cook

          Re: Solution?

          Or if the manufacturer cared enough to still support it past five years. (*cough*SONY*WHEEZE*)

          (Had a laptop that was pretty damn good for it being a 2002 vintage model- it ran XP without any complaint, the onboard graphics were actually decent enough to do some gaming, and it ticked every box I had at the time. fast forward three-four years, to find that there was a bug in the display driver that caused hard locks, but the drivers from manufacturer of the GPU didn't recognize it because the laptop's OEM (Sony) had a custom BIOS for the GPU; They never provided a single driver update in the 5 odd years that had elapsed between introducing that model to when I discovered this issue. Shame, too, as it was a damned solid machine at the time that was supremely easy to work on, had hot-swappable drive modules, and the option for a second battery which gave it a ridiculous amount of run time for the day.

      2. Healeyman

        Re: Solution?

        Decades ago a BIOS flash was pretty tricky, and if you pooched it it bricked your computer. Then, they went to a 'dual BIOS,' where you flashed a 'backup' then overwrote the main if all went well. Haven't done a BIOS flash in a loooong time; glad to hear it's a smoother operation now.

    2. BartyFartsLast Silver badge

      Re: Solution?

      Good news, the EC update is often bundled as part of BIOS updates and is likely to be this time too

    3. gnasher729 Silver badge

      Re: Solution?

      If you needed a firmware update on a Mac, it would be part of your next “software update” and you wouldn’t even know about it. One or more reboots during a software update are quite normal on a Mac.

    4. habilain

      Re: Solution?

      Your laptop maker may push a BIOS update, but even if they don't, processor microcode can be updated by the OS during boot (i.e. on every single boot, the OS should check the processor microcode, and if necessary, will update the microcode. This is not a permanent update, so it happens on every boot.)

  4. An_Old_Dog Silver badge

    This Leaves Me Out

    .... as my Turion is too old a design to have this particular flaw. (Sony Vaio laptop, natch.)

    1. wolfetone Silver badge

      Re: This Leaves Me Out

      I do miss the Sony Vaio line of laptops. They were nice pieces of design.

      1. J. Cook

        Re: This Leaves Me Out

        Solid design, lousy software support. But that's Sony for you. :(

  5. ForthIsNotDead

    Oh woe etc...

    Oh Motorola 68000, why did you leave us so soon! :-)

    1. Anonymous Coward
      Anonymous Coward

      Re: Oh woe etc...

      It is easy not to have flaws when you have no features. Sadly, I too miss my 68k - rose tinted glasses and all that.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like