{"id":478,"date":"2018-01-31T14:44:52","date_gmt":"2018-01-31T11:44:52","guid":{"rendered":"http:\/\/www.angani.co\/blog\/?p=632"},"modified":"2023-12-19T09:27:25","modified_gmt":"2023-12-19T09:27:25","slug":"meltdown-threat-update","status":"publish","type":"post","link":"https:\/\/angani.africa\/blog\/meltdown-threat-update\/","title":{"rendered":"Meltdown Threat Update"},"content":{"rendered":"<p><a href=\"http:\/\/www.angani.co\/blog\/wp-content\/uploads\/2018\/01\/melt.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-6218\" src=\"http:\/\/localhost\/anganiblog\/wp-content\/uploads\/2018\/01\/melt-1-154x300.png\" alt=\"\" width=\"154\" height=\"300\" srcset=\"https:\/\/angani.africa\/blog\/wp-content\/uploads\/2018\/01\/melt-1-154x300.png 154w, https:\/\/angani.africa\/blog\/wp-content\/uploads\/2018\/01\/melt-1.png 161w\" sizes=\"auto, (max-width: 154px) 100vw, 154px\" \/><\/a><\/p>\n<p>1.\u00a0\u00a0\u00a0 What is a Meltdown?<\/p>\n<p style=\"text-align: left;\"><em>Let&#8217;s start with the basics:<\/em><\/p>\n<p style=\"text-align: left;\">Operating systems ensure\u00a0that user applications cannot access each other\u2019s memories\u00a0and prevent user applications from reading or writing\u00a0kernel memory. This isolation is a cornerstone of our\u00a0computing environments and allows running multiple applications\u00a0on personal devices or executing processes of\u00a0multiple users on a single machine in the cloud.<\/p>\n<p style=\"text-align: left;\"><em>Here comes the meltdown&#8230;<\/em><\/p>\n<p style=\"text-align: left;\">Meltdown allows overcoming memory isolation\u00a0completely by providing a simple way for any user process to read the entire kernel memory of the machine it\u00a0executes on, including all physical memory mapped in\u00a0the kernel region. It works on all major operating\u00a0systems by exploiting side-channel information\u00a0available on most modern processors.<br \/>\nProcessors these days use out of order execution. instead of waiting on 1 part of the processor to handle specific tasks, these tasks are anticipated and subsequent\u00a0operations\u00a0schedule to idle execution units of the processor.<br \/>\nFrom a security perspective, Out-of-order; vulnerable CPUs allow an unprivileged process to load data from a privileged<br \/>\n(kernel or physical) address into a temporary CPU register.\u00a0As a result, an\u00a0attacker can dump the entire kernel memory by reading\u00a0privileged memory in an out-of-order execution stream,\u00a0and transmit the data from this elusive state<\/p>\n<p style=\"text-align: left;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2. What Angani has done to protect its clients<\/p>\n<p style=\"text-align: left;\">On the knowledge of this threat, we your cloud partner had a debugging maintenance carried out 2 weeks ago. We did a threat assessment and found that VMs on PV were susceptible to the attack. We therefore carried a maintenance where we moved them over to HVM. This ensures that all the data flowing on our infrastructure is safe.<br \/>\nKindly do take measures to ensure that the on premise hardware that you have is protected as well.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/meltdownattack.com\">For more information on the Meltdown malware<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>1.\u00a0\u00a0\u00a0 What is a Meltdown? Let&#8217;s start with the basics: Operating systems ensure\u00a0that user applications cannot access each other\u2019s memories\u00a0and prevent user applications&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[133],"tags":[],"class_list":["post-478","post","type-post","status-publish","format-standard","hentry","category-blog"],"_links":{"self":[{"href":"https:\/\/angani.africa\/blog\/wp-json\/wp\/v2\/posts\/478","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/angani.africa\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/angani.africa\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/angani.africa\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/angani.africa\/blog\/wp-json\/wp\/v2\/comments?post=478"}],"version-history":[{"count":1,"href":"https:\/\/angani.africa\/blog\/wp-json\/wp\/v2\/posts\/478\/revisions"}],"predecessor-version":[{"id":6219,"href":"https:\/\/angani.africa\/blog\/wp-json\/wp\/v2\/posts\/478\/revisions\/6219"}],"wp:attachment":[{"href":"https:\/\/angani.africa\/blog\/wp-json\/wp\/v2\/media?parent=478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/angani.africa\/blog\/wp-json\/wp\/v2\/categories?post=478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/angani.africa\/blog\/wp-json\/wp\/v2\/tags?post=478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}