Intel Kernel Memory Leak

Thread Starter

Raymond Genovese

Joined Mar 5, 2016
1,653
What I am reading is that several Linux patches have already been distributed. Windows users have to wait for the Second Tuesday Fix Up (STFU) ;)

This has been going on for the last decade??

Edit: I guess there are some standalone Windows patches out, but I can't find one for 7 only 10.
 
Last edited:

hrs

Joined Jun 13, 2014
394
https://www.bleepingcomputer.com/ne...995-vulnerable-to-meltdown-and-spectre-flaws/

Google: Almost All CPUs Since 1995 Vulnerable To "Meltdown" And "Spectre" Flaws
https://www.theregister.co.uk/2018/01/04/intel_amd_arm_cpu_vulnerability/

Meltdown does not affect any AMD processors.

AMD insists its processors are practically immune to Variant 2 Spectre attacks, which siphon data from the kernel. As for Variant 1, you'll have to wait for microcode updates or recompile your software with forthcoming countermeasures described in the technical paper on the Spectre website.
 

nsaspook

Joined Aug 27, 2009
13,079
https://www.theregister.co.uk/2018/01/04/intel_amd_arm_cpu_vulnerability/

Meltdown does not affect any AMD processors.

AMD insists its processors are practically immune to Variant 2 Spectre attacks, which siphon data from the kernel. As for Variant 1, you'll have to wait for microcode updates or recompile your software with forthcoming countermeasures described in the technical paper on the Spectre website.
Google didn't investigate AMD or ARM for Meltdown so I hope so but practically immune to Variant 2 Spectre attacks is like being a little pregnant. Covert and Side Channels Due to Processor Architecture is old news but this makes it a reliable method (CPUs that do speculative execution) with Spectre.
I mainly run Linux so the patches are already. I hope a microcode update will make the necessary kernel security hacks run faster.
 

nsaspook

Joined Aug 27, 2009
13,079
https://support.google.com/faqs/answer/7625886
“Retpoline” sequences are a software construct which allow indirect branches to be isolated from speculative execution. This may be applied to protect sensitive binaries (such as operating system or hypervisor implementations) from branch target injection attacks against their indirect branches.

The name “retpoline” is a portmanteau of “return” and “trampoline.” It is a trampoline construct constructed using return operations which also figuratively ensures that any associated speculative execution will “bounce” endlessly.

(If it brings you any amusement: imagine speculative execution as an overly energetic 7-year old that we must now build a warehouse of trampolines around.)
 

Thread Starter

Raymond Genovese

Joined Mar 5, 2016
1,653
Interestingly, I just did a Windows (7) monthly update push. I thought that they came out on a 2nd Tue schedule? I wonder if this included patches - just says monthly security update.
 

DbLoud120

Joined May 26, 2014
90
Interestingly, I just did a Windows (7) monthly update push. I thought that they came out on a 2nd Tue schedule? I wonder if this included patches - just says monthly security update.
You can check what the update is for under windows updates in settings. Click on view installed update history.. Double click a
listed update and it will expand, showing what update was for.
 

Thread Starter

Raymond Genovese

Joined Mar 5, 2016
1,653
You can check what the update is for under windows updates in settings. Click on view installed update history.. Double click a
listed update and it will expand, showing what update was for.
Yep, thx. To be exact, you really need to then go look at what the KB number is for (a link is provide on the double click) - at least on my machine. BTW: It was NOT for the indications in the thread.
 

BR-549

Joined Sep 22, 2013
4,928
You wouldn't believe. I never had to re-install windows 7. About 2 weeks ago....after a few days of trouble shooting with MS techs........I was advised to clean, re-install windows 10 pro by MS.

So I did. Didn't work. 3 times it didn't work. I had to un-install some updates......put update on pause....and stand by for MS to get back to me.

They got back to me a few days ago....gave me a procedure.....it worked......back to normal.......then this Intel thing happens.

I was hoping that after decades......re-installing windows was over.
 

nsaspook

Joined Aug 27, 2009
13,079
https://www.engadget.com/2018/01/10/nvidia-gpu-meltdown-and-spectre-patches/
It's not just your processor and operating system that are affected by the Meltdown and Spectre memory vulnerabilities -- your graphics card is, too. To that end, NVIDIA has detailed how its GPUs are affected by the speculative execution attacks and has started releasing updated drivers that tackle the issue.
It's really just a patch for CPU related Spectre in drivers, not the GPU hardware (GPUs don't perform speculative execution).
https://nvidia.custhelp.com/app/answers/detail/a_id/4611

The new driver was just released on Debian 64 for my new server.
 
Last edited:
Top