cancel
Showing results for 
Search instead for 
Did you mean: 

Another INTEL bug | ZombieLoad / Microarchitectural Data Sampling

segfaulted
Level 7
There have been quite a few variants since the original spectre / meltdown revelations, this one appears different yet equally severe. Details are of course still coming but atm there is little known besides Intel have aparently released CPU firmware updates. Which board vendors and what products are patched remains. Can Asus comment?


For reference:

CVE-2018-12126 Microarchitectural Store Buffer Data Sampling (MSBDS)
CVE-2018-12130 Microarchitectural Fill Buffer Data Sampling (MFBDS)
CVE-2018-12127 Microarchitectural Load Port Data Sampling (MLPDS)
CVE-2019-11091 Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

These too affect SKUs going back decades.
9,093 Views
7 REPLIES 7

pokuly
Level 8
Microsoft offers a microcode update patch also: https://support.microsoft.com/en-us/help/4497165/kb4497165-intel-microcode-updates
Info how to check: https://www.zdnet.com/article/how-to-test-mds-zombieload-patch-status-on-windows-systems/

Together with recent Win updates and the recent MS script it shows here:

MDSWindowsSupportPresent : True
MDSHardwareVulnerable : True
MDSWindowsSupportEnabled : True

jologskyblues
Level 8
This is the last straw. I'm done with Intel. Next build will be AMD.

If i read all notes these is bad

Speculation control settings for CVE-2017-5715 [branch target injection]

Hardware support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is enabled: True

Speculation control settings for CVE-2017-5754 [rogue data cache load]

Hardware requires kernel VA shadowing: False

Speculation control settings for CVE-2018-3639 [speculative store bypass]

Hardware is vulnerable to speculative store bypass: True
Hardware support for speculative store bypass disable is present: True
Windows OS support for speculative store bypass disable is present: True
Windows OS support for speculative store bypass disable is enabled system-wide: False

Speculation control settings for CVE-2018-3620 [L1 terminal fault]

Hardware is vulnerable to L1 terminal fault: False

Speculation control settings for MDS [microarchitectural data sampling]

Windows OS support for MDS mitigation is present: True
Hardware is vulnerable to MDS: True
Windows OS support for MDS mitigation is enabled: False

Suggested actions

* Follow the guidance for enabling Windows Client support for speculation control mitigations described in https://support.microsoft.com/help/4073119


BTIHardwarePresent : True
BTIWindowsSupportPresent : True
BTIWindowsSupportEnabled : True
BTIDisabledBySystemPolicy : False
BTIDisabledByNoHardwareSupport : False
BTIKernelRetpolineEnabled : False
BTIKernelImportOptimizationEnabled : True
KVAShadowRequired : False
KVAShadowWindowsSupportPresent : True
KVAShadowWindowsSupportEnabled : False
KVAShadowPcidEnabled : False
SSBDWindowsSupportPresent : True
SSBDHardwareVulnerable : True
SSBDHardwarePresent : True
SSBDWindowsSupportEnabledSystemWide : False
L1TFHardwareVulnerable : False
L1TFWindowsSupportPresent : True
L1TFWindowsSupportEnabled : False
L1TFInvalidPteBit : 0
L1DFlushSupported : True
MDSWindowsSupportPresent : True
MDSHardwareVulnerable : True
MDSWindowsSupportEnabled : False
Learn, Play Enjoy!

MrAgapiGC
Level 13
Mine

MDSWindowsSupportPresent : True
MDSHardwareVulnerable : True
MDSWindowsSupportEnabled : False

That is bad?
Learn, Play Enjoy!

MrAgapiGC
Level 13
that I can not undestant. But If i read my results, ASUS have to send another bios on supported models to make adjustemts. Since i am running NORMAL drivers from the board website, They have to send new drivers. I have like to the new ones, but MOST are not savy like us. most drivers are outdated and old.

On my field, ROG board Z170/Z270 i recomend the use of new drivers ONLY on the post on those. These include Z370 and for the moment Z390.

These has to be send to verification ASUS CORP so they can integrate on OFFICIAL drivers.

On new board that have the ARMORY CRATE, PLEASE ASUS MAKE IT WORK. Or ditch it if the company have no plans to make it work since the only thing on my CODE XI that is usefull, is that i can track what is install to better read the current version on my stuff.

Remember INTEL make these as a challenge, and paying for these, and a lot of cash.

the best way is to be ready and Asus push Bios and drivers (special these last one)
Learn, Play Enjoy!

segfaulted
Level 7
Appears Intel CPU's are vulnerable yet again, everything since 2012.

https://labs.bitdefender.com/2019/08/bypassing-kpti-using-the-speculative-behavior-of-the-swapgs-ins...

https://www.amd.com/en/corporate/product-security

One of the more damning thing about these is vendors claiming users need to update. While that is nice and semi accurate the unfortunate reality is those same vendors piggyback other changes onto their security updates. Microsoft for example.

Security behind closed doors is no security at all. Fact that these get so little coverage even on "tech" sites is astounding.