{"id":33061,"date":"2018-01-04T13:40:28","date_gmt":"2018-01-04T13:40:28","guid":{"rendered":"https:\/\/www.cloudcomputing-news.net\/news\/2018\/jan\/04\/aws-microsoft-google-and-more-respond-chip-vulnerability-issue\/"},"modified":"2018-01-04T13:40:28","modified_gmt":"2018-01-04T13:40:28","slug":"aws-microsoft-google-and-more-respond-on-chip-vulnerability-issue","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/aws-microsoft-google-and-more-respond-on-chip-vulnerability-issue\/","title":{"rendered":"AWS, Microsoft, Google and more respond on chip vulnerability issue"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/www.cloudcomputing-news.net\/media\/img\/news\/circuit-board-picture-id537368620.jpg\"><\/p>\n<p>Leading cloud providers have said they are aware of and working on securing systems after the disclosure of two major chip-level security vulnerabilities earlier this week.<\/p>\n<p>As first reported <a href=\"https:\/\/www.theregister.co.uk\/2018\/01\/02\/intel_cpu_design_flaw\/\">by The Register<\/a>, a &lsquo;fundamental&rsquo; design flaw in Intel&rsquo;s processor chips, dubbed Meltdown, was followed by another flaw, called Spectre, found in chips from Intel, AMD and ARM. The latter was confirmed by Google researchers in a blog post <a href=\"https:\/\/security.googleblog.com\/2018\/01\/todays-cpu-vulnerability-what-you-need.html\">published yesterday<\/a>.<\/p>\n<p>The key to the vulnerability is through a processor technique called &lsquo;speculative execution&rsquo;. In other words, modern processors can estimate what task needs to be done next, and if it is correct, then is executed in a much quicker time than otherwise. As the Google blog notes, malicious actors &lsquo;could take advantage of speculative execution to read system memory that should have been inaccessible&rsquo;, such as passwords or encryption keys.<\/p>\n<p>So how does this affect cloud providers? A blogger going under the name of Python Sweetness <a href=\"http:\/\/pythonsweetness.tumblr.com\/post\/169166980422\/the-mysterious-case-of-the-linux-page-table\">asserted<\/a> on January 1 that the vulnerability will affect major cloud providers. &ldquo;There are hints the attack impacts common virtualisation environments including Amazon EC2 and Google Compute Engine,&rdquo; the post reads.<\/p>\n<p>In a <a href=\"https:\/\/aws.amazon.com\/security\/security-bulletins\/AWS-2018-013\/\">security bulletin<\/a>, Amazon Web Services (AWS) said &lsquo;all but a small single-digit percentage of instances across the Amazon EC2 fleet&rsquo; were already protected. Microsoft said in a statement that it was &ldquo;in the process of deploying mitigations to cloud services&rdquo;, as well as releasing security updates. Google <a href=\"https:\/\/support.google.com\/faqs\/answer\/7622138\">issued a bulletin<\/a> for its cloud products with Compute Engine, Kubernetes Engine, Cloud Dataflow and Cloud Dataproc requiring updates, while a <a href=\"https:\/\/blog.digitalocean.com\/a-message-about-intel-security-findings\/\">statement<\/a> from Josh Feinblum, chief security officer at DigitalOcean, recommended server reboots for users and promised urgent maintenance if this was unsuccessful. &nbsp;<\/p>\n<p>A <a href=\"https:\/\/newsroom.intel.com\/news\/intel-responds-to-security-research-findings\/\">statement from Intel<\/a> issued yesterday said the company was committed to product and customer security and was working with AMD, ARM, and others &lsquo;to develop an industry-wide approach to resolve this issue promptly and constructively.&rsquo;<\/p>\n<p>&ldquo;Intel has begun providing software and firmware updates to mitigate these exploits,&rdquo; the statement added. &ldquo;Contrary to some reports, any performance impacts are workload-dependent, and, for the average computer user, should not be significant and will be mitigated over time.&rdquo;<\/p>\n<p>AMD also issued <a href=\"https:\/\/www.amd.com\/en\/corporate\/speculative-execution\">an update<\/a>, stressing the importance that the research was performed in lab conditions and the threat had not been seen in the public domain.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Leading cloud providers have said they are aware of and working on securing systems after the disclosure of two major chip-level security vulnerabilities earlier this week.<br \/>\nAs first reported by The Register, a &lsquo;fundamental&rsquo; design flaw in I&#8230;<\/p>\n","protected":false},"author":50,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-33061","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/33061","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=33061"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/33061\/revisions"}],"predecessor-version":[{"id":33062,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/33061\/revisions\/33062"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=33061"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=33061"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=33061"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}