Meltdown and Spectre Vulnerabilities?
Question ID: 108073
1
0

Has MicroFocus released any information on Meltdown and Spectre Vulnerabilities?

Marked as spam
Posted by (Questions: 89, Answers: 0)
Asked on January 19, 2018 9:05 pm
127 views
Answers (2)
1
Private answer

*** MicroFocus has release the following in a Knowledge Base article on these vulnerabilities... ***

Title : Meltdown and Spectre Security Flaws

Document ID : KM03071562

OS :

Updated : 2018-Jan-11

*** Problem ***

Vertica engineers have run performance tests using the operating system patches for the Meltdown and Spectre security flaws. Based on the results, Vertica recommends that, for minimal performance impact and addressing most security issues, customers enable the PTI and IBPB features but not the IBRS feature.

Earlier this month, researchers announced two speculative execution security vulnerabilities in chips that are present in most modern processors.

Meltdown: Meltdown allows multiple processes on a processor to access the contents of another process's memory. This vulnerability has only be verified on Intel processors: CVE-2017-5754 (https://nvd.nist.gov/vuln/detail/CVE-2017-5754)

Spectre: Spectre affects processors that implement branch prediction and speculative execution. This vulnerability may allow processes to read and modify the data cache.

Two variants of Spectre has been verified on several modern processors: Variant 1 CVE-2017-5753 (https://nvd.nist.gov/vuln/detail/CVE-2017-5753) and Variant 2 CVE-2017-5715 (https://nvd.nist.gov/vuln/detail/CVE-2017-5715). Variant 1 is fixed with a kernel patch. You cannot disable this patch and there is no measureable performance impact from this patch.

There are three optional patches that ship in current hotfixes of most Linux distributions. They install the following features:

KPTI (Kernel Page Table Isolation) protects against Meltdown. Implemented in the kernel.

IBRS (Indirect Branch Restricted Speculation) protects against Spectre Variant 2. Implemented in the kernel and CPU microcode.

IBPB (Indirect Branch Prediction Barrier) protects against Spectre Variant 2. Implemented in the kernel and CPU microcode.

For more detailed information about these patches, see https://access.redhat.com/articles/3311301.

*** There is a table in the MicroFocus KB article here with benchmarks ***
https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/-/facetsearch/document/KM03071562

For further details, graphs and FAQs please review attached document. You may also find the complete notification at one of the following URLS:

https://my.vertica.com/blog/vertica-test-results-operating-system-patches-meltdown-spectre-security-flaws/

https://forum.vertica.com/discussion/239346/vertica-test-results-for-operating-system-patches-for-meltdown-and-spectre-security-flaws#latest

https://www.linkedin.com/pulse/vertica-test-results-operating-system-patches-spectre-technical-team/

Marked as spam
Posted by (Questions: 0, Answers: 309)
Answered on January 19, 2018 9:25 pm
1
Private answer

*** MicroFocus has release the following in a Knowledge Base article on these vulnerabilities... ***

Title : Meltdown and Spectre Security Flaws

Document ID : KM03071562

OS :

Updated : 2018-Jan-11

*** Problem: ***

Vertica engineers have run performance tests using the operating system patches for the Meltdown and Spectre security flaws. Based on the results, Vertica recommends that, for minimal performance impact and addressing most security issues, customers enable the PTI and IBPB features but not the IBRS feature.

Earlier this month, researchers announced two speculative execution security vulnerabilities in chips that are present in most modern processors.

Meltdown: Meltdown allows multiple processes on a processor to access the contents of another process's memory. This vulnerability has only be verified on Intel processors: CVE-2017-5754 (https://nvd.nist.gov/vuln/detail/CVE-2017-5754)

Spectre: Spectre affects processors that implement branch prediction and speculative execution. This vulnerability may allow processes to read and modify the data cache.

Two variants of Spectre has been verified on several modern processors: Variant 1 CVE-2017-5753 (https://nvd.nist.gov/vuln/detail/CVE-2017-5753) and Variant 2 CVE-2017-5715 (https://nvd.nist.gov/vuln/detail/CVE-2017-5715). Variant 1 is fixed with a kernel patch. You cannot disable this patch and there is no measureable performance impact from this patch.

There are three optional patches that ship in current hotfixes of most Linux distributions. They install the following features:

KPTI (Kernel Page Table Isolation) protects against Meltdown. Implemented in the kernel.

IBRS (Indirect Branch Restricted Speculation) protects against Spectre Variant 2. Implemented in the kernel and CPU microcode.

IBPB (Indirect Branch Prediction Barrier) protects against Spectre Variant 2. Implemented in the kernel and CPU microcode.

For more detailed information about these patches, see https://access.redhat.com/articles/3311301.

*** There is a table in the MicroFocus KB article here with benchmarks ***
https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/-/facetsearch/document/KM03071562

For further details, graphs and FAQs please review attached document. You may also find the complete notification at one of the following URLS:

https://my.vertica.com/blog/vertica-test-results-operating-system-patches-meltdown-spectre-security-flaws/

https://forum.vertica.com/discussion/239346/vertica-test-results-for-operating-system-patches-for-meltdown-and-spectre-security-flaws#latest

https://www.linkedin.com/pulse/vertica-test-results-operating-system-patches-spectre-technical-team/

Marked as spam
Posted by (Questions: 0, Answers: 309)
Answered on January 19, 2018 9:25 pm
0
Thanks I'll look through this and post any further questions that I have.
( at January 19, 2018 9:28 pm)
EyeOnTesting

Welcome back to "EyeOnTesting" brought to you by Orasi Software, Inc.

X
Scroll to Top