• Competitor rules

    Please remember that any mention of competitors, hinting at competitors or offering to provide details of competitors will result in an account suspension. The full rules can be found under the 'Terms and Rules' link in the bottom right corner of your screen. Just don't mention competitors in any way, shape or form and you'll be OK.

Intel bug incoming? Meltdown and Spectre exploits

Just disable the windows update service, then again that mean sod all updates.

Yep, that is what I have done for now. Until I see how this pans out for several weeks or so... I don’t need this horsing about just now until they get their crap together.
 
No, they are not telling you everything, that is for Spectre 1, ask them about Spectre 2 and particularity the Meltdown part of the exploit, Meltdown should require a BIOS patch.
I thought it was Spectre that requires a BIOS update with microcode plus various software patches and that Meltdown was purely an O/S patch?
Now I'm even more confused.
 
What is all this nonsense? Windows 10 updates for me are permanently off forever and nothing will change that. I'll let you know if something bad ever happens. What do you guys keep in your PCs I wonder? Everything is on the cloud and needs two-factor auth these days.

haXXors were an early noughties meme so Relax...
 
What is all this nonsense? Windows 10 updates for me are permanently off forever and nothing will change that. I'll let you know if something bad ever happens. What do you guys keep in your PCs I wonder? Everything is on the cloud and needs two-factor auth these days.

haXXors were an early noughties meme so Relax...

It was perfectly possible for scripts in a web browser to be used by a malicious site (and that includes things like ads being hijacked on a legit site, etc.) to exploit this vulnerability and compromise a desktop system.

Fortunately Firefox has already updated to add resilience against this form of attack.
 
I didn't even know GPU's had anything to do with this I thought its was just a CPU thing, just checked the experience and it is downloading the update 390.65
They don't. Nvidia is being responsible and mitigating against these vulnerabilities in the CPU hardware by changing how things are done in their driver.
 
SemiAccurate thinks this exploit is going to devastate Intel’s marketshare


They don't. Nvidia is being responsible and mitigating against these vulnerabilities in the CPU hardware by changing how things are done in their driver.

Specific sequences of instructions in compiled applications are vulnerable to Spectre (bounds check bypass, CVE-2017-5753) so many need to be altered or recompiled. This is why Nvidia released new drivers, and there will be software updates from many others too.

There might be further updates to apply techniques like Retpoline to tackle the other Spectre variant (branch target injection, CVE-2017-5715).

I thought it was Spectre that requires a BIOS update with microcode plus various software patches and that Meltdown was purely an O/S patch?

That's correct. On Windows, the microcode updates being rolled out are to facilitate the OS patch for CVE-2017-5715 (branch target injection). The mitigation for Meltdown is a software workaround in the OS; it's possible there could be a microcode update but that would probably only be if there a way discovered to alleviate the performance hit of the OS workaround.
 
hey guys. Today received an update KB4056892, installed it, but WU history says it failed with code 0x80070643. However in the system information my build is now 16299.192. When i select Check for Updates there are no updates available. So the update is installed fine actually?
 
What is all this nonsense? Windows 10 updates for me are permanently off forever and nothing will change that. I'll let you know if something bad ever happens. What do you guys keep in your PCs I wonder? Everything is on the cloud and needs two-factor auth these days.

haXXors were an early noughties meme so Relax...
"The cloud" is a vague term. My server in my home acts as my "cloud" storage and I access those files all the time from my desktop, laptop, and phone.

On a side note, I wouldn't be surprised if there was some world-wide effort in the next decade to require devices connected to the public internet to have a basic level of security mitigation, no matter how impossible that is to enforce. This doesn't apply so much to the vulnerabilities we're talking about in this thread but in general, the problem is that one infected machine can in turn infect any number of others. It's not all about "your PC", as much as most of us think about it that way.
 
That's correct. On Windows, the microcode updates being rolled out are to facilitate the OS patch for CVE-2017-5715 (branch target injection). The mitigation for Meltdown is a software workaround in the OS; it's possible there could be a microcode update but that would probably only be if there a way discovered to alleviate the performance hit of the OS workaround.
AMD's impact table states that no microcode updates are required for AMD CPUs and that OS and software updates are sufficient to fix Spectre (Variant 1), and that this will bring a negligible performance impact. If you look at recent benchmarks, it's the microcode updates to fix Spectre (Variant 2) on Intel CPUs that are causing most of the performance issues, not the OS updates. So far AMD's analysis seems correct.

Sadly, AMD's decision to follow in Intel's footsteps by implementing a closed-source, extremely privileged, Platform Security Processor means they're not exactly a golden child here. I wouldn't be surprised if Intel has people working on finding flaws in AMD's PSP (we know there are many in Intel's ME) just to give them some bad press too.
 
well honestly amd will do it to intel just as intel will to them.already seen it in media.it is a selling point if you can prove your product isnt effected by a issue or less so than your rival.
 


MS have identified the issue, as noted here.....



https://support.microsoft.com/en-us...security-update-block-for-some-amd-based-devi

According to Microsoft, some AMD PCs are in an unbootable state after installing the recent patches because their chipsets "do not conform" to the documentation that was provided to Microsoft when it was developing mitigation techniques against Meltdown and Spectre. In simpler terms, AMD's provision of incorrect and/or incomplete information regarding the CPU has resulted in potentially thousands of machines being rendered unusable.

^^^^ Found the above on Neowin
 
it was posted to highlight both amd and intel have issues.once one side on here get going its like its intel only or amd only.its both sides that are effected.
 
Back
Top Bottom