Apple’s Spectre and Meltdown dilemma with Mac and iOS
In the past few hours, you may have become aware of the Spectre and Meltdown security issues that are affecting all Mac systems and iOS devices.
These issues apply to all modern processors made by Intel and ARM and therefore affect nearly all computing devices, not just Apple. The good news is that Apple state that there are “no known exploits impacting customers at this time.” Apple has provided updates on iOS 11.2, macOS 10.13.2 and tv0S 11.2 to defend against Meltdown. Apple Watch is not affected by Meltdown. In the next few days, updates will be released for Safari to help defend against Spectre. Further tests and mitigations will be released in upcoming updates on iOS, macOS, tvOS and watchOS. As with all security issues, ensure that you are running the latest software and are only downloading apps from trusted sources such as the App Store. Apple’s full press release on the Spectre and Meltdown security breaches can be found below. About speculative execution vulnerabilities in ARM-based and Intel CPUsSecurity researchers have recently uncovered security issues known by two names, Meltdown and Spectre. These issues apply to all modern processors and affect nearly all computing devices and operating systems. All Mac systems and iOS devices are affected, but there are no known exploits impacting customers at this time. Since exploiting many of these issues requires a malicious app to be loaded on your Mac or iOS device, we recommend downloading software only from trusted sources such as the App Store. Apple has already released mitigations in iOS 11.2, macOS 10.13.2, and tvOS 11.2 to help defend against Meltdown. Apple Watch is not affected by Meltdown. In the coming days, we plan to release mitigations in Safari to help defend against Spectre. We continue to develop and test further mitigations for these issues and will release them in upcoming updates of iOS, macOS, tvOS, and watchOS.
The Meltdown and Spectre issues take advantage of a modern CPU performance feature called speculative execution. Speculative execution improves speed by operating on multiple instructions at once—possibly in a different order than when they entered the CPU. To increase performance, the CPU predicts which path of a branch is most likely to be taken, and will speculatively continue execution down that path even before the branch is completed. If the prediction was wrong, this speculative execution is rolled back in a way that is intended to be invisible to software.The Meltdown and Spectre exploitation techniques abuse speculative execution to access privileged memory—including that of the kernel—from a less-privileged user process such as a malicious app running on a device.
Meltdown is a name given to an exploitation technique known as CVE-2017-5754 or "rogue data cache load." The Meltdown technique can enable a user process to read kernel memory. Our analysis suggests that it has the most potential to be exploited. Apple released mitigations for Meltdown in iOS 11.2, macOS 10.13.2, and tvOS 11.2. watchOS did not require mitigation. Our testing with public benchmarks has shown that the changes in the December 2017 updates resulted in no measurable reduction in the performance of macOS and iOS as measured by the GeekBench 4 benchmark, or in common Web browsing benchmarks such as Speedometer, JetStream, and ARES-6.
Apple News, Rumours
Apple Unleashed Event All The Mac Announcements You Need To Be Aware Of