Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

MacOS is yet to have a patch for 10.12.6 (Sierra) to resolve this.


It is patched on Sierra, this was part of the 2017-002[0] security update on the 6th of December.

0: https://support.apple.com/en-gb/HT208331


That link shows Meltdown in reference only to High Sierra, not Sierra. What am I missing?


You're right, can't believe I missed that.

Edit: See the archive[0] apparently I'm not going mad and it used to say that the patch was applied to Sierra and El Capitan, but Apple has since changed that.

0: https://web.archive.org/web/20180105102220/https://support.a...


Thanks. I thought I was going nuts, too.


Did you get the PoC built on macOS? I can't get it built on El Capitan.


Not any of the PoC. There are repositories around the internet building and working successfully though. E.g. Spectre exploit example https://github.com/ixtal23/spectreScope


FWIW, that PoC (reading user memory only) still works on 10.13.2 even after the patch is applied.


The KAISER[0] fix which is what has been patched by OSes for Meltdown only resolves full physical memory and kernel memory access. You can still use Meltdown techniques to read arbitrary memory in your process, but this seems expected.

0: https://en.wikipedia.org/wiki/Kernel_page-table_isolation


You mean 10.12.6


Ah yes, thanks.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: