Issue metadata
Sign in to add a comment
|
Security: Spectre javascript PoC (in the wild) works on default chrome settings for latest
Reported by
idel...@gmail.com,
Aug 28
|
||||||||||||||||||
Issue descriptionThis template is ONLY for reporting security bugs. If you are reporting a Download Protection Bypass bug, please use the "Security - Download Protection" template. For all other reports, please use a different template. Please READ THIS FAQ before filing a bug: https://chromium.googlesource.com /chromium/src/+/master/docs/security/faq.md Please see the following link for instructions on filing security bugs: https://www.chromium.org/Home/chromium-security/reporting-security-bugs NOTE: Security bugs are normally made public once a fix has been widely deployed. VULNERABILITY DETAILS Spectre (widespread issue with Speculative Execution) has been found to be active on the latest version of chrome. This is using the SharedArrayBuffer 'Default' settings in chrome://flags. This has an easy fix, and the default behaviour should probably be to disable shared array buffers by default in the settings. Ideally this should be forced, but I do understand if you don't - but I'm not quite sure what this would break. VERSION Chrome Version: 67.0.3396.87 (official Build) (64-bit) Operating System: Fedora Linux 27, 4.16.15-200.fc27.x86_64 REPRODUCTION CASE I used the code from this github repo: https://github.com/ascendr/spectre-chrome This was loaded into a local directory off which chrome read the 'check.html' page. FOR CRASHES, PLEASE INCLUDE THE FOLLOWING ADDITIONAL INFORMATION N/A
,
Aug 29
We believe site isolation to be the mitigation for Spectre in general, and the notion that XSS -> Spectre against a specific site-instance seems to be a secondary consequence of XSS. Given an XSS on the site itself, one can likely accomplish whatever is desired without the need for Spectre. As such, we're still comfortable with the current shared array buffer policy.
,
Aug 29
Ok, no worries :) can I release a public advisory on the topic to raise awareness? I imagine people may want to fix this. Many thanks for your time! M.
,
Aug 29
Sure, also note that https://chromium.googlesource.com/chromium/src/+/master/docs/security/side-channel-threat-model.md#Site-Isolation has more information about our responses to spectre.
,
Aug 29
Ok, cheers! Many thanks for your time and help. A much clearer picture has been made of what you're looking for. :D Many thanks! Hope you have a good week. :) M.
,
Dec 6
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||
Comment 1 by idel...@gmail.com
, Aug 28