'Kernel memory leaking' Intel processor design flaw forces Linux, Windows redesign

Discussion in 'other security issues & news' started by Minimalist, Jan 2, 2018.

  1. anon

    anon Registered Member

    Joined:
    Dec 27, 2012
    Posts:
    8,006
  2. Krusty

    Krusty Registered Member

    Joined:
    Feb 3, 2012
    Posts:
    10,240
    Location:
    Among the gum trees
    Yeah, I understood that, and figured that was the older bug you were talking about.

    Cheers!
     
  3. blacknight

    blacknight Registered Member

    Joined:
    Sep 25, 2007
    Posts:
    3,348
    Location:
    Europe, UE citizen
    If Microsoft will release a patch for this bug in the next patch security tuesday, as a security update, it means that I will be forced to install this patch - that I don't want, I don't want to lose in performance of my pc - if I want to install the other security updates. :thumbd:
     
  4. reasonablePrivacy

    reasonablePrivacy Registered Member

    Joined:
    Oct 7, 2017
    Posts:
    2,010
    Location:
    Member state of European Union
  5. Krusty

    Krusty Registered Member

    Joined:
    Feb 3, 2012
    Posts:
    10,240
    Location:
    Among the gum trees
  6. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
  7. anon

    anon Registered Member

    Joined:
    Dec 27, 2012
    Posts:
    8,006
  8. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
    Last edited: Jan 4, 2018
  9. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
    "Windows Meltdown-Spectre patches: If you haven't got them, blame your antivirus

    Microsoft says your antivirus software could stop you from receiving the emergency patches issued for Windows

    Microsoft has warned users that its patches for the dangerous Meltdown CPU bug won't reach them if their third-party antivirus hasn't been updated to support this week's Windows security update..."

    http://www.zdnet.com/article/window...-if-you-havent-got-them-blame-your-antivirus/

    "...Due to an issue with some versions of Anti-Virus software, this fix is only being made applicable to the machines where the Anti virus ISV has updated the ALLOW REGKEY..."

    https://support.microsoft.com/en-us/help/4056892/windows-10-update-kb4056892
     
  10. noway

    noway Registered Member

    Joined:
    Apr 24, 2005
    Posts:
    461
    I just want to download the patch from Microsoft. I don't want to install a compatible AV or wait for any of their stupid rollouts to get to me or read a bunch of their crap about how I'm going to wait for this. I just want the link to the patch. ASAP.

    Update: Found it. Applied it on 2 computers and (older versions of) Sandboxie were disabled on first boot after the patch. Now I feel secure, lol.
     
    Last edited: Jan 4, 2018
  11. WildByDesign

    WildByDesign Registered Member

    Joined:
    Sep 24, 2013
    Posts:
    2,587
    Location:
    Toronto, Canada
    Sorry, I should have noted that SpecuCheck is specifically only command line. I ran it with an admin command prompt because I assume it likely needs admin rights. Hopefully soon someone will release a GUI tool which would be quicker and easier.
     
  12. deBoetie

    deBoetie Registered Member

    Joined:
    Aug 7, 2013
    Posts:
    1,832
    Location:
    UK
    Vmware's advisory is at:

    https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html

    Most products are affected but not Workstation 14 or Fusion 10.

    I cannot find any information about VirtualBox updates regarding this.

    Xen is also affected as noted above. Qubes hasn't had time to evaluate yet:

    https://twitter.com/i/web/status/948875166913789958

    More generally, this is a disaster for smartphones where it is not possible to update the Android version, though I understand it's harder to attack the phone processors.

    Yet again, it highlights the disaster area that uncontrolled Javascript represents.

    Being the suspicious kind of guy I am, I'm wondering whether this disclosure has been prompted by the data breaches at NSA last year. It's just the sort of thing they'd want to have had designed into popular CPUs to extract secrets on the quiet.
     
  13. WildByDesign

    WildByDesign Registered Member

    Joined:
    Sep 24, 2013
    Posts:
    2,587
    Location:
    Toronto, Canada
    I would suggest folks follow Alex Ionescu's Twitter for some deeper details for those who want those kind of details. Go back through his whole timeline of the past day or so.

    Link: https://twitter.com/aionescu/status/948817335980142592
    Erik Loman surprised on that Twitter thread as well.

    Definitely some performance hits for certain hardware. I've got a newer Intel Ultrabook which has the hardware mitigations (possibly more to come via BIOS updates) and I've got an older netbook which does NOT have the hardware mitigations, only software mitigations. Big difference.
     
  14. emmjay

    emmjay Registered Member

    Joined:
    Jan 26, 2010
    Posts:
    1,547
    Location:
    Triassic
    What if AMD is not impacted the same way Intel is? So far I have not seen an AMD announcement regarding the MS patch.

    My laptops (Windows and Linux) are Intel based so I'll install the patch as soon as it is offered, but I also have an AMD desktop and it is used for research. If the patch is not going to address vulnerabilities in the AMD chip design, I'd prefer not to install it. I hope the patch will be out of band and not packaged in a security bundle. The MS patch may impose a percentage performance hit under certain workloads and that is an issue.
     
  15. Fly

    Fly Registered Member

    Joined:
    Nov 1, 2007
    Posts:
    2,201
    It likely will take a long time before this is fixed in new CPUs I presume ?
     
  16. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    163,926
    Location:
    Texas
  17. Stefan Froberg

    Stefan Froberg Registered Member

    Joined:
    Jul 30, 2014
    Posts:
    747
    The below link helped me to understand this flaw better:
    https://arstechnica.com/gadgets/2018/01/whats-behind-the-intel-design-flaw-forcing-numerous-patches/

    So what Linux (and Windows and other OSes ?) running on x86/x86_64 have been doing
    so far was splitting the virtual memory half for user running stuff (your OS, web browser etc...) and kernel stuff and trusting that x86/x86_64 keeped the bad neightbours (aka bad userland software) from snooping kernel stuff.

    And now thanks to this x86/x86_64 silicone bug, the barriers are falling apart. So now the kernel stuff needs to be completely isolated, which will create some performance penalty depending of how much each application uses the kernel system calls like write(), read() etc... (List of various system calls: https://filippo.io/linux-syscall-table)

    So if the software uses just few system calls rarely, these patches have no performance impact whatsoever.
     
  18. paulderdash

    paulderdash Registered Member

    Joined:
    Dec 27, 2013
    Posts:
    4,644
    Location:
    Under a bushel ...
    Must be doing something stupid, I did run it in PS (Admin) but I get:

    SpecuCheck.exe : The term 'SpecuCheck.exe' is not recognized as the name of a cmdlet, function, script file, or
    operable program. Check the spelling of the name, or if a path was included, verify that the path is correct and try
    again.
    At line:1 char:1
    + SpecuCheck.exe
    + ~~~~~~~~~~~~~~
    + CategoryInfo : ObjectNotFound: (SpecuCheck.exe:String) [], CommandNotFoundException
    + FullyQualifiedErrorId : CommandNotFoundException

    Edit: But I agree with Krusty, I know I am affected anyway.
     
    Last edited: Jan 4, 2018
  19. anon

    anon Registered Member

    Joined:
    Dec 27, 2012
    Posts:
    8,006
    https://www.bleepingcomputer.com/ne...pdates-to-fix-meltdown-and-spectre-cpu-flaws/
     
  20. zapjb

    zapjb Registered Member

    Joined:
    Nov 15, 2005
    Posts:
    5,556
    Location:
    USA still the best. But barely.
    And that remained secret until it was discovered by an entity non-3letter obligated. So Intel has to say look what we found [cough cough 10yrs later].
     
  21. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
  22. paulderdash

    paulderdash Registered Member

    Joined:
    Dec 27, 2013
    Posts:
    4,644
    Location:
    Under a bushel ...
    Yip, WU has now offered it on a WD only machine (regkey exists). Nothing yet on two machines with Emsisoft AM (no such regkey).

    Edit: One way for MS to make themselves look 'better', introducing a pre-req that no-one else knows about till later :shifty: :D.
     
    Last edited: Jan 4, 2018
  23. HempOil

    HempOil Registered Member

    Joined:
    Jun 15, 2015
    Posts:
    225
    Location:
    Canada
    Nothing here, running Comodo Internet Security.
     
  24. zapjb

    zapjb Registered Member

    Joined:
    Nov 15, 2005
    Posts:
    5,556
    Location:
    USA still the best. But barely.
    M$ with their 10,000+ software engineers is ignoring putting out a fix for Windows 7 till when?
     
  25. mary7

    mary7 Registered Member

    Joined:
    Oct 17, 2017
    Posts:
    57
    Location:
    Italy
    I have installed manually the update with microsoft catalog. i have Kis2017j in one pc and kis2018f in another, Kaspersky has patched on december 29 with the compatibility for this microsoft update and I have found the

    Key="HKEY_LOCAL_MACHINE"Subkey="SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat"
    Value Name="cadca5fe-87d3-4b96-b7fb-a231484277cc"
    Type="REG_DWORD”
    Data="0x00000000”

    but windows update this morning not found the update with the patch so I downloaded from the catalog
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.