'Kernel memory leaking' Intel processor design flaw forces Linux, Windows redesign

Discussion in 'other security issues & news' started by Minimalist, Jan 2, 2018.

  1. paulderdash

    paulderdash Registered Member

    Joined:
    Dec 27, 2013
    Posts:
    4,639
    Location:
    Under a bushel ...
    So obvious, in retrospect ;).
     
  2. blacknight

    blacknight Registered Member

    Joined:
    Sep 25, 2007
    Posts:
    3,344
    Location:
    Europe, UE citizen
    I have a SSD. :( Thank you Intel and Microsoft for your efficiency and capacity !!! You couldn't wait a moment and realize a patch that don't slow our systems, is it ? Your only concern is your commercial imagine: " show to the user that we resolve ( ..... ) immediately the problem ". The problem was known, but you move only when it is publicized.

    There is a way to install all the other security patches next tuesday alone this ?
     
  3. roger_m

    roger_m Registered Member

    Joined:
    Jan 25, 2009
    Posts:
    8,627
    After installing the patch, in the following benchmarks, some SSD operations were faster.
    Testing Windows 10 Performance Before and After the Meltdown Flaw Emergency Patch.
     
  4. BoerenkoolMetWorst

    BoerenkoolMetWorst Registered Member

    Joined:
    Dec 22, 2009
    Posts:
    4,867
    Location:
    Outer space
    Discovered that myself as well :D
     
  5. paulderdash

    paulderdash Registered Member

    Joined:
    Dec 27, 2013
    Posts:
    4,639
    Location:
    Under a bushel ...
  6. blacknight

    blacknight Registered Member

    Joined:
    Sep 25, 2007
    Posts:
    3,344
    Location:
    Europe, UE citizen
  7. mary7

    mary7 Registered Member

    Joined:
    Oct 17, 2017
    Posts:
    57
    Location:
    Italy
  8. roger_m

    roger_m Registered Member

    Joined:
    Jan 25, 2009
    Posts:
    8,627
    What CPUs are in the other two computers?
     
  9. blacknight

    blacknight Registered Member

    Joined:
    Sep 25, 2007
    Posts:
    3,344
    Location:
    Europe, UE citizen
    Anyway.....

    - an HIPS well configured should block every try to use the leak is it ? To use it it need a Java script and/or what else ?


    - the regular use of a good program to clean every traces ( i.e. PrivaZer ) should delete every trace in memory, so the leak couldn't be successfully exploited.
     
  10. mary7

    mary7 Registered Member

    Joined:
    Oct 17, 2017
    Posts:
    57
    Location:
    Italy
    Pentium (R) CPU B960
    Pentium G3260

    the one in the list is the Celeron J series
     
  11. anon

    anon Registered Member

    Joined:
    Dec 27, 2012
    Posts:
    7,982
  12. paulderdash

    paulderdash Registered Member

    Joined:
    Dec 27, 2013
    Posts:
    4,639
    Location:
    Under a bushel ...
  13. elapsed

    elapsed Registered Member

    Joined:
    Apr 5, 2004
    Posts:
    7,076
    Why? It's not like AMD is doing a very good job at showing up in the laptop market at the moment. Maybe they will focus more on that this year.
     
  14. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,065
    Location:
    DC Metro Area
  15. daman1

    daman1 Registered Member

    Joined:
    Mar 27, 2009
    Posts:
    1,292
    Location:
    USA, MICHIGAN
  16. Socio

    Socio Registered Member

    Joined:
    Jun 29, 2004
    Posts:
    362
  17. Socio

    Socio Registered Member

    Joined:
    Jun 29, 2004
    Posts:
    362
  18. reasonablePrivacy

    reasonablePrivacy Registered Member

    Joined:
    Oct 7, 2017
    Posts:
    2,001
    Location:
    Member state of European Union
    Adversary needs way to execute code on your PC, even on most untrusted by OS level. Ideally for adversary are binary programs, but in some cases interpreted languages executed in environment with JIT (such as Javascript in browsers) can also try to exploit vulnerabilities.
    I don't think third-party security programs can do much about misbehaving hardware and prevent reads from other processes. Even kernel patches are just mitigating, not completely fixing underlying issue.
     
  19. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,065
    Location:
    DC Metro Area
  20. WildByDesign

    WildByDesign Registered Member

    Joined:
    Sep 24, 2013
    Posts:
    2,587
    Location:
    Toronto, Canada
    So for those without an AV, you can either install the patch manually or manually add the registry value/key and at that point allow Windows Update to pull the update in for you. The level of AV interference here is quite interesting, but also Microsoft's decision to not push this update out to users without AV is also quite interesting. But I suppose all of this was quite rushed from a development and deployment perspective, considering all aspects here.
     
  21. blacknight

    blacknight Registered Member

    Joined:
    Sep 25, 2007
    Posts:
    3,344
    Location:
    Europe, UE citizen
    Why ? whatever code or process or something else the attacker use, it must be executed on my system, and an HIPS setted as deny for default and allow for exception should detect and block it.
     
  22. pb1

    pb1 Registered Member

    Joined:
    Apr 4, 2014
    Posts:
    1,269
    Location:
    sweden

    According to the info i got that software on the link is for an OLD vulnerability. Apply the info on this link and you will get a correct answer, for shure - https://www.bleepingcomputer.com/ne...stems-for-the-meltdown-and-spectre-cpu-flaws/

    The first link also showed me to be safe, a false result according to the second and definitely correct one since it is the same info about the handling/control that can be found on Ms pages
     
  23. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,592
    Location:
    U.S.A.
    Although my AV vendor, Eset, was one of the first to create the required reg. key, I still had not received the two updates via Windows Update. Most likely since I have an AMD processor. So I just downloaded from Win Catalog and applied them manually. So far, so good.
     
  24. BoerenkoolMetWorst

    BoerenkoolMetWorst Registered Member

    Joined:
    Dec 22, 2009
    Posts:
    4,867
    Location:
    Outer space
    SpecuCheck 1.0.3 released:
    https://github.com/ionescu007/SpecuCheck/releases
     
  25. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,592
    Location:
    U.S.A.
    Of note is by applying the MS patch, this processor vulnerability is substantially mitigated in Edge and IE11.
    https://www.bleepingcomputer.com/news/security/list-of-meltdown-and-spectre-vulnerability-advisories-patches-and-updates
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.