Skip to main content

Digital Trends may earn a commission when you buy through links on our site. Why trust us?

Qualcomm is working on patches to address Meltdown and Spectre flaws

exploit
Image used with permission by copyright holder
A so-called bug initially ascribed solely to Intel CPUs is actually a pair of exploits that, taken together, impact many of the CPUs being used in PCs, mobile devices, and data centers. The bugs now have names — Meltdown, which affects Intel processors, and, which is more widespread and affects CPUs from Intel, AMD, and ARM.

As Windows Central now reports, Intel has issued a statement indicating that the issue is not specifically a bug in Intel CPUs but rather an exploit that can be applied to all systems, including those with ARM and AMD processors.

Recommended Videos

“Recent reports that these exploits are caused by a ‘bug’ or a ‘flaw’ and are unique to Intel products are incorrect,” Intel said in a statement. “Based on the analysis to date, many types of computing devices — with many different vendors’ processors and operating systems — are susceptible to these exploits.”

The issue is related to how programs access memory, specifically information that should only be accessible to the operating system kernel that maintains the highest level of privileges. The exploits are ones where malicious programs can access the protected kernel memory space and “see” information that should be locked away.

The full details, which are not yet available, are quite technical and relate to how a CPU moves in and out of protected kernel mode. The Google blog outlines the issue, which was discovered by its Google Project Zero team in 2017. The result is what matters: Keeping the kernel in virtual memory makes the process as fast as possible. If the CPU doesn’t have to dump and then reload the kernel, then it can achieve faster performance. Unfortunately, it also makes kernel contents vulnerable to being accessed by nefarious programs.

The fix for Meltdown, as The Guardian outlines, has to be implemented by the operating system in a process labeled Kernel Page Table Isolation (KPTI), which puts the kernel in an area of protected memory space that cannot be accessed by other programs. That creates extra processing steps — dumping and then reloading kernel data — that can slow things down, although, according to Intel, the impact is limited to specific workflows and typical users will not notice much impact. Machines using Intel’s Skylake or later CPUs will see less of an impact than older systems. Spectre will take longer to resolve but is also much more difficult to exploit.

All operating systems will need to implement some form of KPTI in order to bypass the bug and improve security. Microsoft has already issued an emergency patch, which it apparently had been testing in earlier Windows Insider builds, to address the issue. Google has also provided a fix in the latest Android security updates, which so far have primarily rolled out to Google’s Nexus and Pixel smartphones. More generally, ARM has provided patches to companies using its processors. Linux and MacOS will also need to be updated, meaning this is an equal-opportunity bug, although AMD has stated that there is “near zero risk to AMD products at this time.”

The fixes for the problem may degrade performance, but so far, it appears that problem isn’t cause for serious concern. TechRadar tested Windows after the patch, and found a difference of no more than 10 percent — in a few limited scenarios. In most cases, the difference was only 1 or 2 percent.

What can you do to protect your device?

Multiple companies are scrambling to fix the problem. Your best bet, as usual, is to keep your PC updated with any new drivers that become available.

Qualcomm has announced that its processors are also vulnerable to Meltdown and Spectre attacks. It told the Register that it was working on “incorporating and deploying mitigations” against the attacks. It advised users to update their device as soon as the updates became available.

Intel, in its statement, said that by the end of next week, “it expects to have issued updates for more than 90 percent of processor products introduced within the past five years.” These updates are not direct-to-consumer, however, but instead go out to OS vendors and hardware manufacturers. You’ll have to check with your PC’s manufacturer to see if any firmware updates have been issued.

Microsoft’s fix was released late on January 3. You can likely see it if you check Windows Update. If it’s missing, check our Windows 10 Update guide for advice on how to make the utility behave. Firmware updates have been issued for most Surface devices, too, though the original Surface Pro, Surface Pro 2, and Surface 3 haven’t seen a fix yet.

Apple has released a statement, saying “All Mac systems and iOS devices are affected, but there are no known exploits […]” The company has released “mitigation” for Meltdown in MacOS 10.13.2, iOS 11.2, and tvOS 11.2. The Spectre exploit, meanwhile, will be tackled in upcoming updates.

Firefox 57 and Chrome 64 will include updates that fix the flaw. Browsers are a popular attack vector for malware, so it’s important to update. Firefox’s patch is already available, and Chrome’s should come later this week.

Google Chromebooks should be protected, as fixes to the problem began to arrive in Chrome OS 63.

While the PC is the great concern due to the combined assault of the Meltdown and Spectre attacks, the Spectre flaw might also impact some AMD-based computers and some Android smartphones. It’s unclear to what extent the flaw works on these devices — but, as a general rule, you should keep your device’s operating system and software updated.

This is not a flaw you can counter by installing an antivirus or turning a feature off, which is what makes it so serious. Updating your device, whatever it is, is the only way to protect yourself — so make sure to check for the latest software and firmware.

Updated on January 6: Added information about Qualcomm’s vulnerabilities and work on security patches. 

Mark Coppock
Mark Coppock is a Freelance Writer at Digital Trends covering primarily laptop and other computing technologies. He has…
I love Macs. But here are 5 reasons I keep coming back to Windows
Windows 11 set up on a computer.

Thanks to the massive success of Apple Silicon, Macs have become increasingly tempting. Plenty of folks are heading back to the Mac for the first time in years, and in doing so, making the dramatic switch from Windows 11 to macOS.

When it comes to these operating systems, though, they're not equal across the board. And in the end, here are the five things that keep me coming back to Windows 11.
Device support

Read more
I review laptops for a living, and these are the settings I change on every device
The System Settings app in macOS Sonoma, with the Screen Saver sub-menu open, allowing a user to choose a video screen saver.

I've reviewed nearly all of the best laptops, and when I get my hands on a new one, I instinctively adjust some settings to ensure that I'm meeting a standard configuration. I need to make sure every laptop is set up the same way, as closely as possible, to ensure my benchmarks and testing are consistent. While those settings aren't relevant for most users, the process has given me some insight into how various settings impact day-to-day use.

So, when I start using a laptop for real work, I have a core group of settings that I change to fit my workflow. I'll outline those here, for both Windows 11 and MacOS. It's not a one-size-fits-all scenario, but hopefully, some of these changes will make your computing more efficient and enjoyable.
Start with power management
In Windows 11, the first place I go in the Settings app is System and then Power & battery. Windows defaults to a very short screen-on time for both battery use and when plugged in, and I adjust those in Screen and sleep to an hour and three hours, respectively, for turning off the screen and putting the laptop to sleep. If you'd rather your screen turn off, but the laptop remain awake, then adjust accordingly. And, my times may not work for you. I don't often keep my laptops sitting there with the display open, and they go to sleep when I close the lid.

Read more
Is macOS more secure than Windows? This malware report has the answer
A person using a laptop with a set of code seen on the display.

It’s a long-held belief that Macs are less at risk of malware and viruses than Windows PCs, but how true is that? Well, a new report has shed some light on the situation -- and the results might surprise you.

According to threat research firm Elastic Security Labs, roughly 39% of all malware infections happen on Windows PCs. In good news for Apple fans, only 6% of breaches occurred on macOS, making Mac systems far less vulnerable than their Windows counterparts.

Read more