Meltdown Spectre security vulnerabilities

Meltdown Spectre security vulnerabilities
Meltdown and Spectre security vulnerabilities

 

 

 







Meltdown Spectre security vulnerabilities

As Intel, AMD, and other CPU manufacturers have started releasing firmware updates for processor models affected by the Meltdown and Spectre patches, those updates are now integrating these patches into BIOS/UEFI updates for affected PCs.

These BIOS/UEFI updates are to address the Meltdown and Spectre issues that have happened since the beginning of the year.

Software patches at the operating system level have largely mitigated the Meltdown flaw, but both Microsoft and the Linux community said a firmware fix would be necessary to fully address the Spectre vulnerability. WhizzleShamizzle. Meltdown and Spectre security vulnerabilities

Easily examine Windows hardware and software capability to prevent Meltdown and Spectre attacks – Download InSpectre

 

Acer Acer only lists vulnerable desktop, notebook, and server products. Says it will release firmware updates for server products in March. No timeline for desktop and notebook products.
ASRock The ASRock site is a mess. There’s no central security advisory, and users will have to visit the “Latest BIOS Update” page and sift through the updates by hand. The good news is that there are a lot of recent BIOS releases containing Intel updates dated after the Meltdown and Spectre disclosure.
ASUS ASUS says it will release BIOS updates for affected products by the end of January.
Dell BIOS updates are available for some Dell desktop, notebook, and server products. The Dell security advisory contains several other links to various products types. You can use this page as the central hub to search for what you need.
Fujitsu BIOS updates are available for some products, but not all. The security advisory contains multiple links to various product types.
Gigabyte Motherboard provider Gigabyte has released BIOS updates. Users will have to access the advisory, click on the motherboard series name in the list of affected table, and check for a recent BIOS update on each motherboard product’s page.
HP BIOS updates are available for almost half of the HP products listed as vulnerable.
Huawei Huawei has only listed vulnerable products. Says an “investigation is still ongoing.”
Intel Intel has released updates for most NUC, Compute Stick, and Compute Card products.
Lenovo Lenovo has the best advisory yet, with detailed tables for all affected products, including download links and upcoming BIOS download availability for each one.
LG Nothing is available for LG at present, if it becomes available it will be updated
Panasonic Panasonic said it aims to release BIOS updates for vulnerable PC models starting the end of the month and continuing through February and March.
Microsoft Microsoft has released UEFI updates for Surface products.
MSI MSI has released BIOS updates.
Toshiba Toshiba has not released any BIOS/UEFI updates just yet. The company lists affected products and an approximate timeline when it hopes to have updates available.
Vaio Some BIOS updates are available. More to follow.

Meltdown and Spectre security vulnerabilities

Update to disable mitigation against Spectre, Variant 2

WhizzleShamizzle

Notice: Applying this update will disable the Spectre variant 2 mitigation CVE-2017-5715 – “Branch target injection vulnerability.” Customers can apply this update to prevent unpredictable system behaviors, performance issues, and/or unexpected reboots after installation of microcode.

Intel has reported issues with recently released microcode meant to address Spectre variant 2 (CVE 2017-5715 Branch Target Injection) – specifically Intel noted that this microcode can cause “higher than expected reboots and other unpredictable system behavior” and then noted that situations like this may result in “data loss or corruption.” Our own experience is that system instability can in some circumstances cause data loss or corruption. On January 22, Intel recommended that customers stop deploying the current microcode version on affected processors while they perform additional testing on the updated solution. We understand that Intel is continuing to investigate the potential effect of the current microcode version, and we encourage customers to review their guidance on an ongoing basis to inform their decisions. WhizzleShamizzle

While Intel tests, updates and deploys new microcode, we are making available an out-of-band update today, KB4078130, that specifically disables only the mitigation against CVE-2017-5715 – “Branch target injection vulnerability.” In our testing, this update has been found to prevent the described behavior in devices that have affected microcode. For the full list of affected devices, see Intel’s microcode revision guidance. This update covers Windows 7 (SP1), Windows 8.1, and all versions of Windows 10, for client and server. If you are running an affected device, this update can be applied by downloading it from the Microsoft Update Catalog website. Application of this payload specifically disables only the mitigation against CVE-2017-5715 – “Branch target injection vulnerability.” WhizzleShamizzle

Note Users who do not have the affected Intel microcode do not have to download this update.

We are also offering a new option – available for advanced users on affected devices – to manually disable and enable the mitigation against Spectre Variant 2 (CVE 2017-5715) independently through registry setting changes. The instructions for the registry key settings can be found in the following Knowledge Base articles:

Download Patch or directly from the Microsoft Catalog

Further updates will be added as they’re released.

Meltdown and Spectre security vulnerabilities

GeGeek

Owner and Creator of GeGeek

GeGeek has 282 posts and counting. See all posts by GeGeek

Leave a Reply

Your email address will not be published. Required fields are marked *