{"id":11551,"date":"2018-02-21T08:30:11","date_gmt":"2018-02-21T16:30:11","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/02\/21\/news-5322\/"},"modified":"2018-02-21T08:30:11","modified_gmt":"2018-02-21T16:30:11","slug":"news-5322","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/02\/21\/news-5322\/","title":{"rendered":"Intel releases more Meltdown\/Spectre firmware fixes, Microsoft feints an SP3 patch"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.techhive.com\/images\/article\/2017\/04\/patch-100719564-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Wed, 21 Feb 2018 07:56:00 -0800<\/strong><\/p>\n<p>One month ago today, Intel <a href=\"https:\/\/www.computerworld.com\/article\/3250250\/malware-vulnerabilities\/belay-that-order-intel-says-you-should-not-install-its-meltdown-firmware-fixes.html\" rel=\"noopener\" target=\"_blank\">told the world<\/a> that their Meltdown\/Spectre patches were a mess. Their advice read something like, \u201cOoopsie. Those extremely important BIOS\/UEFI firmware updates we released a coupla weeks ago are causing Intel machines to drop like bungee cows. In spite of what we told you then, stop installing them now. And if you installed a bad BIOS\/UEFI patch, well golly, <a href=\"https:\/\/www.computerworld.com\/article\/3250297\/microsoft-windows\/let-the-biosuefi-firmware-recall-begin.html\">contact your PC manufacturer<\/a> to see if they know how to get you out of the mess.\u201d<\/p>\n<p>Intel now says it has released really new, really good firmware versions for most of its chips.<\/p>\n<p>Scanning the official <a href=\"https:\/\/newsroom.intel.com\/wp-content\/uploads\/sites\/11\/2018\/02\/microcode-update-guidance.pdf\" rel=\"noopener nofollow\" target=\"_blank\">Microcode Revision Guidance February 20, 2018<\/a> (pdf), you can see that Coffee Lake, Kaby Lake, Bay Trail and most Skylake chips are covered. On the other hand, Broadwell, Haswell, and Sandy Bridge chips still leave brown skid marks.<\/p>\n<p>Security Advisory <a href=\"https:\/\/security-center.intel.com\/advisory.aspx?intelid=INTEL-SA-00088&amp;languageid=en-fr\" rel=\"noopener nofollow\" target=\"_blank\">INTEL-SA-00088<\/a> has been updated with this squib:<\/p>\n<p>We have now released new production microcode updates to our OEM customers and partners for Kaby Lake, Coffee Lake, and additional Skylake-based platforms. As before, these updates address the reboot issues last discussed<a href=\"https:\/\/newsroom.intel.com\/news\/security-issue-update-progress-continues-firmware-updates\/\" rel=\"noopener nofollow\" target=\"_blank\"> here<\/a>, and represent the breadth of our 6th, 7th and 8th Generation Intel\u00ae Core\u2122 product lines as well as our latest Intel\u00ae Core\u2122 X-series processor family. They also include our recently announced Intel\u00ae Xeon\u00ae Scalable and Intel\u00ae Xeon\u00ae D processors for datacenter systems. \u00a0We continue to release beta microcode updates for other <a href=\"https:\/\/newsroom.intel.com\/wp-content\/uploads\/sites\/11\/2018\/02\/microcode-update-guidance.pdf\" rel=\"noopener nofollow\" target=\"_blank\">affected products<\/a> so that customers and partners have the opportunity to conduct extensive testing before we move them into production.<\/p>\n<p>Intel goes on to recommend basically the same stuff they recommended last time, with a specific call-out:<\/p>\n<p>The \u201cFor most users\u201d update is KB 4078130, the surprise Friday evening patch, released on Jan. 26, which <a href=\"https:\/\/www.computerworld.com\/article\/3252025\/microsoft-windows\/windows-surprise-patch-kb-4078130-the-hard-way-to-disable-spectre-2.html\">I discussed<\/a> almost a month ago:<\/p>\n<p>On Friday night, Microsoft released a strange patch called<a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4078130\/update-to-disable-mitigation-against-spectre-variant-2\" rel=\"noopener nofollow\" target=\"_blank\"> KB 4078130<\/a> that \u201cdisables mitigation against Spectre, variant 2.\u201d The KB article goes to great lengths describing how Intel\u2019s the bad guy and its microcode patches don\u2019t work right:<\/p>\n<p>There aren\u2019t any details, but apparently this patch \u2014 which isn\u2019t being sent out the Windows Update chute \u2014 adds two registry settings that \u201cmanually disable mitigation against Spectre Variant 2\u201d<\/p>\n<p>Rummaging through the lengthy <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073119\/protect-against-speculative-execution-side-channel-vulnerabilities-in\" rel=\"noopener nofollow\" target=\"_blank\">Microsoft IT Pro Guidance page<\/a>, there\u2019s an important warning:<\/p>\n<p>Customers who only install the Windows January and February 2018 security updates will not receive the benefit of all known protections against the vulnerabilities. In addition to installing the January and February security updates, a processor microcode, or firmware, update is required. This should be available through your OEM device manufacturer.<\/p>\n<p>In what must be an amazing coincidence, last night Microsoft released a firmware update for the Surface Pro 3. It\u2019s currently available as a manual download (\u201cMSI format\u201d) for Surface Pro 3. I haven\u2019t seen it come down the Windows Update chute. Perhaps Microsoft is beta testing it once again. Per Brandon Records on the <a href=\"https:\/\/blogs.technet.microsoft.com\/surface\/2018\/02\/21\/updates-for-surface-pro-3-20-february-2018\/\" rel=\"noopener nofollow\" target=\"_blank\">Surface blog<\/a>:<\/p>\n<p>We&#8217;ve released a new driver and firmware update for Surface Pro 3. This update includes new firmware for Surface UEFI which resolves potential security vulnerabilities, including Microsoft security advisory <a href=\"https:\/\/portal.microsoft.com\/en-us\/security-guidance\/advisory\/ADV180002\" rel=\"noopener nofollow\" target=\"_blank\">180002<\/a>.<\/p>\n<p>This update is available in MSI format from the <a href=\"https:\/\/aka.ms\/drivers\/surfacepro3\" rel=\"noopener nofollow\" target=\"_blank\">Surface Pro 3 Drivers and Firmware page<\/a> at the Microsoft Download Center.<\/p>\n<p>Except, golly, \u00a0the latest version of the patch on that page (as of 10 am Eastern US time) is marked \u201cDate Published 1\/24\/2018.\u201d The official <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4023484\/surface-surface-pro-3-update-history?os=windows-10\" rel=\"noopener nofollow\" target=\"_blank\">Surface Pro 3 update history page<\/a> lists the last firmware update for the SP3 as being dated Oct. 27, 2017.<\/p>\n<p>And, golly squared, <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/adv180002\" rel=\"noopener nofollow\" target=\"_blank\">Microsoft Security Advisory 180002<\/a> doesn\u2019t even mention the Surface Pro 3. It hasn\u2019t been updated since Feb. 13. It links to the <em>Surface Guidance to protect against speculative execution side-channel vulnerabilities<\/em> page, <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073065\/surface-guidance-to-protect-against-speculative-execution-side-channel\" rel=\"noopener nofollow\" target=\"_blank\">KB 4073065<\/a>, which doesn\u2019t mention the Surface Pro 3 and hasn\u2019t been updated since Feb. 2.<\/p>\n<p>You\u2019d have to be incredibly trusting \u2014 of both Microsoft and Intel \u2014 to manually install <strong><em>any <\/em><\/strong>Surface firmware patch at this point. Particularly when you realize that not one single Meltdown or Spectre-related exploit is in the wild. Not one.<\/p>\n<p>Thx Bogdan Popa <a href=\"http:\/\/news.softpedia.com\/news\/microsoft-releases-new-meltdown-spectre-fixes-for-surface-pro-3-519879.shtml\" rel=\"noopener nofollow\" target=\"_blank\">Softpedia News<\/a>.<\/p>\n<p><em>Fretting over Meltdown and Spectre? Assuage your fears on the <\/em><a href=\"https:\/\/www.askwoody.com\/2018\/intel-releases-more-meltdown-spectre-firmware-fixes-while-microsoft-unveils-a-new-surface-pro-3-firmware-fix-that-doesnt-exist\/\" rel=\"noopener nofollow\" target=\"_blank\"><em>AskWoody Lounge<\/em><\/a><em>.<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3257225\/microsoft-windows\/intel-releases-more-meltdownspectre-firmware-fixes-microsoft-feints-an-sp3-patch.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.techhive.com\/images\/article\/2017\/04\/patch-100719564-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Wed, 21 Feb 2018 07:56:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>One month ago today, Intel <a href=\"https:\/\/www.computerworld.com\/article\/3250250\/malware-vulnerabilities\/belay-that-order-intel-says-you-should-not-install-its-meltdown-firmware-fixes.html\" rel=\"noopener\" target=\"_blank\">told the world<\/a> that their Meltdown\/Spectre patches were a mess. Their advice read something like, \u201cOoopsie. Those extremely important BIOS\/UEFI firmware updates we released a coupla weeks ago are causing Intel machines to drop like bungee cows. In spite of what we told you then, stop installing them now. And if you installed a bad BIOS\/UEFI patch, well golly, <a href=\"https:\/\/www.computerworld.com\/article\/3250297\/microsoft-windows\/let-the-biosuefi-firmware-recall-begin.html\">contact your PC manufacturer<\/a> to see if they know how to get you out of the mess.\u201d<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3257225\/microsoft-windows\/intel-releases-more-meltdownspectre-firmware-fixes-microsoft-feints-an-sp3-patch.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[714,10761],"class_list":["post-11551","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-security","tag-windows-10"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11551"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11551\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11551"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}