Pages: [1]   Go Down
  Print  
Author Topic: Intel Memory Access Design Flaw Already Addressed by Apple in macOS 10.13.2  (Read 366 times)
HCK
Global Moderator
Hero Member
*****
Posts: 79425



« on: January 06, 2018, 04:05:08 pm »

Intel Memory Access Design Flaw Already Addressed by Apple in macOS 10.13.2

A serious design flaw and security vulnerability discovered in Intel CPUs has reportedly already been partially addressed by Apple in the recent macOS 10.13.2 update, which was released to the public on December 6.





<img src="" alt="" width="648" height="366" class="aligncenter size-full wp-image-569431" />


According to developer Alex Ionescu, Apple introduced a fix in macOS 10.13.2, with additional tweaks set to be introduced in macOS 10.13.3, currently in beta testing. AppleInsider also says that it has heard from "multiple sources within Apple" that updates made in macOS 10.13.2 have mitigated "most" security concerns associated with the KPTI vulnerability.





<center><blockquote class="twitter-tweet" data-lang="en"><p lang="en" dir="ltr">The question on everyone's minds: Does MacOS fix the Intel #KPTI Issue? Why yes, yes it does. Say hello to the &quot;Double Map&quot; since 10.13.2 -- and with some surprises in 10.13.3 (under Developer NDA so can't talk/show you). cc @i0n1c @s1guza @patrickwardle pic.twitter.com/S1YJ9tMS63</p>&mdash; Alex Ionescu (@aionescu) January 3, 2018 <script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></center>Publicized yesterday, the design flaw in Intel chips allows normal user programs to see some of the contents of the protected kernel memory, potentially giving hackers and malicious programs access to sensitive information like passwords, login keys, and more.





Full details on the vulnerability continue to be unavailable and under embargo, so it's not yet clear just how serious it is, but fixing it involves isolating the kernel's memory from user processes using Kernel Page Table Isolation at the OS level. Implementing Kernel Page Table Isolation could cause a performance hit on some machines.





According to The Register, which first shared details on the vulnerability, Windows and Linux machines will see a 5 to 30 percent slowdown once a fix is in place. It appears Macs may not be hit as heavily, as no noticeable performance slowdowns have been reported since the launch of macOS 10.13.2.





Ionescu also says that performance drop on a system with PCID (Process-Context Identifiers), available on most modern Macs, is "minimal," so most users may not see an impact on day-to-day Mac usage.

<div class="linkback">Tag: Intel</div>
Discuss this article in our forums

<div class="feedflare">
<img src="[url]http://feeds.feedburner.com/~ff/MacRumors-Front?d=yIl2AUoC8zA" border="0"></img>[/url] <img src="[url]http://feeds.feedburner.com/~ff/MacRumors-Front?d=6W8y8wAjSf4" border="0"></img>[/url] <img src="[url]http://feeds.feedburner.com/~ff/MacRumors-Front?d=qj6IDK7rITs" border="0"></img>[/url]
</div><img src="http://feeds.feedburner.com/~r/MacRumors-Front/~4/fEeD7i3-1NY" height="1" width="1" alt=""/>

Source: Intel Memory Access Design Flaw Already Addressed by Apple in macOS 10.13.2
Logged
Pages: [1]   Go Up
  Print  
 
Jump to: