Deleted133263User Posted March 9, 2018 Author Share Posted March 9, 2018 (edited) InSpectre has been updated to release #7 : https://www.grc.com/x/news.exe?cmd=article&group=grc.sqrl&item=18254&utag= Everyone,As I discussed on the podcast yesterday, Microsoft will betaking some responsibility for patching Intel (and eventuallyperhaps AMD?) processor microcode on-the-fly when Windows boots.That's TERRIFIC news! But it's going to create confusion...As Microsoft's current page shows, they will be incrementallyreleasing microcode by specific processor, keyed to the CPUID.Since this will create a HUGE DEMAND for people to know whattheir own CPUID is, and since it's not obvious, I have updatedGRC's InSpectre app to release #7 to include a report of this:https://www.grc.com/dev/InSpectre.exeThe internal text is also updated to aim people whose processorsare not yet updated, to the Microsoft knowledgebase page bysearching the Internet for the string "KB4090007":> https://support.microsoft.com/en-us/help/4090007/intel-microcode-updatesI have not yet updated the InSpectre homepage to discuss this,nor have I made release #7 public. I wanted to give everyonehere the opportunity to check it out first. If anything appearsto be wrong with it... I'm all ears! Thanks everyone!! Since that news group post was made the release has been uploaded at the link in the first post here. Edited March 9, 2018 by Guest Link to comment Share on other sites More sharing options...
Deleted133263User Posted March 15, 2018 Author Share Posted March 15, 2018 A bit off topic but a heads up .. AMD chipset users who escaped the Meltdown vulnerabilities (but some still need a bit of attention for the Spectre vulnerabilities apparently) have a new thing to be concerned with. If you have Ryzen or EPYC then there are some serious flaws (4 types including back doors implanted by a contracted company outside of AMD) which have been revealed (well not just revealed, the security firm made a dedicated website for it, and only gave AMD 1 days notice) AMD Flaws If you want to know why so little notice was given have a read here http://www.tomshardware.com/news/cts-labs-amd-ryzenfall-ryzen-epyc,36660.html Link to comment Share on other sites More sharing options...
Erik005 Posted March 15, 2018 Share Posted March 15, 2018 (edited) A bit off topic but a heads up .. AMD chipset users who escaped the Meltdown vulnerabilities (but some still need a bit of attention for the Spectre vulnerabilities apparently) have a new thing to be concerned with. If you have Ryzen or EPYC then there are some serious flaws (4 types including back doors implanted by a contracted company outside of AMD) which have been revealed (well not just revealed, the security firm made a dedicated website for it, and only gave AMD 1 days notice) AMD Flaws If you want to know why so little notice was given have a read here http://www.tomshardware.com/news/cts-labs-amd-ryzenfall-ryzen-epyc,36660.html If you had read just a little bit into the cts-labs you would know it is absolute nonsense, they flashed a custom bios on the system. Edited March 15, 2018 by Erik005 Link to comment Share on other sites More sharing options...
Deleted133263User Posted March 15, 2018 Author Share Posted March 15, 2018 (edited) If you had read just a little bit into the cts-labs you would know it is absolute nonsense, they flashed a custom bios on the system. Go to 7 mins and 30 seconds in your video you are presenting as a backup to your claim that this is nonsense, and he says words to the effect of "even if all of this is possible" .. Thats not refuting the claims of CTS, his personal opinion is just making this seem unlikely because CTS have not provided any proof of concept code, which they have also stated Q&A: Doesn't this publication put users at risk? No. All technical details that could be used to reproduce the vulnerabilities have been redactedfrom this publication. CTS has shared this information with AMD, Microsoft, and a small numberof companies that could produce patches and mitigations. Flashing the custom chip among the chipset is only one of the things they claim to have done, which in itself is not insignificant if it is true, it still represents a bad security risk, which imho is not to be sneezed at. Here's a video from someone who's opinion I trust .. Some of it may well turn out to be bogus or not so much of a concern, the company doing this may have some kind of grudge, but I dont think we can just put this down as nonsense .. Go to about 20 mins in on the Security Now podcast https://twit.cachefly.net/video/sn/sn0654/sn0654_h264m_864x480_500.mp4 Lets see what AMD have to say about this in due course Edit : Just found someone else seems to be sceptical too, suspecting stock manipulation https://www.theinquirer.net/inquirer/news/3028437/amd-ryzen-epyc-cpus-critical-flaws-linus-torvalds-fake But note that report ends with the following : All that being said, CTS-Labs did get Dan Guido, founder of security firm Trail of Bits, to independently review its findings. Guido noted that each flaw does exist and works in the way CTS-Labs claims it does: "Regardless of the hype around the release, the bugs are real, accurately described in their technical report (which is not public afaik), and their exploit code works." The security researcher highlighted that while all the flaws do indeed need admin access, they pose a threat by allowing hackers to spread malware from machine to machine or carry out espionage with the use of undetectable malware installed directly on a chip's firmware. Edited March 15, 2018 by Guest Link to comment Share on other sites More sharing options...
Erik005 Posted March 15, 2018 Share Posted March 15, 2018 (edited) I don't doubt that there might me some bugs, but the whole thing seems off especially the report that says AMD stock is worth $0 and the should file for bankruptcy. They also paid Dan Guido $16.000 for the peer review which is fishy. Also both reports used so many buzzwords to get to investors like espionage and national security. The fixes for Spectre are out, apparently Intel has decided to patch up to sandy bridge, I hope they patch up to the C2D 8xxx/ C2Q 9xxx Edited March 15, 2018 by Erik005 Link to comment Share on other sites More sharing options...
Deleted133263User Posted March 15, 2018 Author Share Posted March 15, 2018 O_o the microsoft fix list for Spectre has grown quicker than expected https://support.microsoft.com/en-us/help/4090007/intel-microcode-updates When I posted that link 6 days ago they only had two processors covered with that Microsoft boot fix, so it is as they say expanding with more coverage the more Intel adds Spectre Microcode fixes to it. Shouldn't be too long before they have the majority of them done and we can all use that update. Though I think if my machine vendor comes out with the BIOS update I will probably still use that. Link to comment Share on other sites More sharing options...
Deleted133263User Posted April 15, 2018 Author Share Posted April 15, 2018 InSpectre has been updated Release #8 — Now shows whether an Intel microcode patch is (ever) available for Spectre.Intel has finished designing microcode update patches for its processors. On April 2nd, 2018, they announced that processors that have not yet been patches will never be patched. Their full statement is available in this PDF document. In that document, Intel specifies which of their many processors do have patches and which of their more recent processors will never receive updated firmware. Now that the industry has this information, this 8th release of InSpectre incorporates that list of CPUIDs and displays whether microcode firmware updates exist for the system's Intel CPU. Link to comment Share on other sites More sharing options...
Deleted133263User Posted April 18, 2018 Author Share Posted April 18, 2018 AMD Spectre mitigation update news https://www.amd.com/en/corporate/security-updates#paragraph-290416 Link to comment Share on other sites More sharing options...
TheMastersSon Posted April 18, 2018 Share Posted April 18, 2018 (edited) Two words: Microsoft Detours. Code injection has been legitimized even by Microsoft, Nvidia and others in their drivers, thus computer users have zero confidence that their own machines are ever doing what they appear or claim to be doing. It's legitimized and forced malware, and one of many intentional corruptions of Windows ("TrustedInstaller" etc etc) that have eliminated admin control from Windows end users. So please don't confuse these microcode updates with computer security. CPU manufacturers can release all the firmware updates they wish, the underlying problem imo is this now legitimized code injection concept. It's precisely how much or most malware works, and it may be efficient but the cost is absolute unreliability. Edited April 18, 2018 by TheMastersSon Link to comment Share on other sites More sharing options...
Deleted133263User Posted April 28, 2018 Author Share Posted April 28, 2018 And at long last my machine has had all the fixes, although at the moment the Spectre microcode fix is the one fed to the processor as windows boots up, I would still prefer the BIOS fix from MSI, which is going to take a while longer. https://support.microsoft.com/en-us/help/4090007/intel-microcode-updates https://support.microsoft.com/en-us/help/4078407/update-to-enable-mitigation-against-spectre-variant-2 InSpectre release #8 (running in Admin mode) detects all of them as fixed And so far I have had no detectable performance decrease in games, but if that happens just use InSpectre before hand and use its Disable fix buttons temporarily. Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now