UPDATED 23:52 EDT / MAY 09 2018

INFRA

Most operating systems add vulnerability based on ‘misunderstanding’

In an age when tech companies are obsessed with diversity, all operating system makers, nearly without fail, have delivered the ultimate equal-opportunity error.

In particular, they introduced a serious vulnerability that is being described by many as a “misunderstanding” of Intel Corp. and Advanced Micro Devices Inc. documentation.

The vulnerability, introduced by way of an update that so far applies to Windows, macOS, Linux in multiple distributions, FreeBSD and others, relates to a hardware debug mechanism that allows potential hackers to crash computers or to read sensitive data in memory.

In relation to Intel chips, CERT said in an advisory Tuesday that “in certain circumstances after the use of certain Intel x86-64 architecture instructions, a debug exception pointing to data in a lower ring (for most operating systems, the kernel Ring 0 level) is made available to operating system components running in Ring 3.”

According to IT News, the OS-level issue involves the ability of assembly code POP SS and MOV SS instructions to be executed by malicious actors, followed immediately by a software-generated interrupt or SYSCALL. That triggers a hardware debug exception running at the highest-level kernel privilege with full access to all parts of the computer.

Explaining the issue further, Red Hat Inc. noted that “generally, exceptions are raised at the instruction boundary; all instructions before the one causing the exception are allowed to complete and the one causing the exception is stalled, so that it can resume execution once the exception has been handled.”

The good news is that most operating system makers have issued patches to counter the issue — so far Apple, DragonFly BSD, FreeBSD, Microsoft, Red Hat, SUSE Linux, Ubuntu, VMware and Xen.

That a vulnerability could be introduced via an alleged “misunderstanding” of advice from Intel is another matter. The fact that Intel, AMD, CERT and operating system makers all coordinated to patch the vulnerability is the positive takeaway, but ultimately it should never have gotten to this point to begin with.

Image: U.S. Air Force


Since you’re here …

… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.

If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.