{"id":11278,"date":"2018-01-29T06:30:02","date_gmt":"2018-01-29T14:30:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/01\/29\/news-5049\/"},"modified":"2018-01-29T06:30:02","modified_gmt":"2018-01-29T14:30:02","slug":"news-5049","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/01\/29\/news-5049\/","title":{"rendered":"Windows surprise patch KB 4078130: The hard way to disable Spectre 2"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security12-100734741-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Mon, 29 Jan 2018 05:49:00 -0800<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">As we crawl deeper down the Meltdown\/Spectre bunny hole, Microsoft released on Friday night a weird, download-only patch that disables the \u201cfix\u201d that\u2019s supposed to protect you against one of the Spectre variants. It\u2019s the same patch, that works the same way, on every version of Windows, from Win7 to the latest Win10 beta builds.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I\u2019m tempted to call it an out-of-band patch, but truth is that all of this month\u2019s patches have been out of band.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You\u2019ve no doubt been inundated by the news about <\/span><a href=\"https:\/\/danielmiessler.com\/blog\/simple-explanation-difference-meltdown-spectre\/\" rel=\"nofollow\"><span style=\"font-weight: 400;\">Meltdown and Spectre<\/span><\/a><span style=\"font-weight: 400;\">, the two (actually, three) highly publicized security vulnerabilities in essentially all modern computer chips that, at this point, has never been seen on a real, live, in-the-wild computer. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">You all know that Intel <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3250250\/malware-vulnerabilities\/belay-that-order-intel-says-you-should-not-install-its-meltdown-firmware-fixes.html\"><span style=\"font-weight: 400;\">has acknowledged <\/span><\/a>that\u00a0<span style=\"font-weight: 400;\">its latest firmware patches <\/span><a href=\"https:\/\/newsroom.intel.com\/news\/intel-security-issue-update-addressing-reboot-issues\/\" rel=\"nofollow\"><span style=\"font-weight: 400;\">can cause<\/span><\/a><span style=\"font-weight: 400;\"> \u201chigher system reboots after applying firmware updates\u201d in essentially <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3250297\/microsoft-windows\/let-the-biosuefi-firmware-recall-begin.html\"><span style=\"font-weight: 400;\">all modern versions<\/span><\/a><span style=\"font-weight: 400;\"> of its chips. If you\u2019ve been paying attention, you also know that, on the software side, Microsoft has <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3246028\/win7-monthly-rollup-kb-4056894-signals-early-abbreviated-patch-tuesday.html\"><span style=\"font-weight: 400;\">patched<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3246286\/microsoft-windows\/buggy-win7-meltdown-patch-kb-4056894-throwing-blue-screens.html\"><span style=\"font-weight: 400;\">bricked<\/span><\/a><span style=\"font-weight: 400;\"> (more accurately, \u201crendered unbootable\u201d), <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3246188\/microsoft-yanks-buggy-windows-meltdown-spectre-patches-for-amd-computers.html\"><span style=\"font-weight: 400;\">pulled<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3249767\/patching-meltdown-windows-fixes-sloppy-net-warnings-about-word-and-outlook.html\"><span style=\"font-weight: 400;\">repatched<\/span><\/a><span style=\"font-weight: 400;\"> and generally changed Windows patching from a once-a-month headache to an <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3216425\/microsoft-windows\/microsoft-patch-alert-lots-of-lingering-problems-in-a-very-messy-month.html\"><span style=\"font-weight: 400;\">advanced persistent threat<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Now for something completely different.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On Friday night, Microsoft released a strange patch called <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4078130\/update-to-disable-mitigation-against-spectre-variant-2\" rel=\"nofollow\"><span style=\"font-weight: 400;\">KB 4078130<\/span><\/a><span style=\"font-weight: 400;\"> that \u201cdisables mitigation against Spectre, variant 2.\u201d The KB article goes to great lengths describing how Intel\u2019s the bad guy and its microcode patches don\u2019t work right:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While Intel tests, updates and deploys new microcode, we are making available an out of band update today, KB4078130, that specifically disables only the mitigation against CVE-2017-5715 \u2013 \u201cBranch target injection vulnerability.\u201d In our testing this update has been found to prevent the behavior described. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">There aren\u2019t any details, but apparently this patch \u2014 which isn\u2019t being sent out the Windows Update chute \u2014 adds two registry settings that \u201cmanually disable mitigation against Spectre Variant 2\u201d:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management&#8221; \/v FeatureSettingsOverride \/t REG_DWORD \/d 1 \/f<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management&#8221; \/v FeatureSettingsOverrideMask \/t REG_DWORD \/d 1 \/f<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It appears that these are the same changes implemented weeks ago by Steve Gibson in his <\/span><a href=\"https:\/\/www.grc.com\/inspectre.htm\" rel=\"nofollow\"><span style=\"font-weight: 400;\">InSpectre program<\/span><\/a><span style=\"font-weight: 400;\">. Steve\u2019s program gives you the option to turn off Spectre protection. The registry keys were <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073119\/protect-against-speculative-execution-side-channel-vulnerabilities-in\" rel=\"nofollow\"><span style=\"font-weight: 400;\">originally documented <\/span><\/a><span style=\"font-weight: 400;\">on Jan. 3 \u2014 they\u2019re hardly new.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But how, you may ask, does KB 4078130 actually work? It probably doesn\u2019t disable Intel\u2019s BIOS\/UEFI firmware (although there was one occasion I can recall, years ago, when a Windows patch <\/span><a href=\"https:\/\/support.microsoft.com\/en-ca\/help\/3064209\/june-2015-intel-cpu-microcode-update-for-windows\" rel=\"nofollow\"><span style=\"font-weight: 400;\">did update Intel microcode<\/span><\/a><span style=\"font-weight: 400;\">). More likely, the registry changes implement some sort of bypass within Windows itself to avoid using the dicey Spectre 2 part of the Intel microcode. Only Microsoft knows for sure, and Microsoft ain\u2019t saying.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So, the proverbial bottom line: Should you be concerned?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Short answer, no. In particular, if you\u2019ve followed my recommendations and avoided this entire Meltdown\/Spectre upgrading debacle \u2014 haven\u2019t installed any of this month\u2019s patches, haven\u2019t installed the latest BIOS\/UEFI microcode \u2014 there\u2019s nothing in KB 4078130 that\u2019s of interest.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On the other hand, if you <\/span><a href=\"https:\/\/www.askwoody.com\/2018\/did-you-install-the-latest-meltdown-spectre-bios-uefi-firmware-update-jokes-on-you\/\" rel=\"nofollow\"><span style=\"font-weight: 400;\">have installed your vendor\u2019s microcode update<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><strong>and <\/strong><span style=\"font-weight: 400;\">you\u2019ve installed the January Windows patches (one or more of the gazillion on offer), <\/span><strong>and <\/strong><span style=\"font-weight: 400;\">you\u2019re having problems \u2014 your machine stops unexpectedly, or performance hit the bottom of a molasses sludge pit \u2014 then<\/span><a href=\"https:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=4078130%20\" rel=\"nofollow\"><span style=\"font-weight: 400;\"> installing KB 4078130 <\/span><\/a><span style=\"font-weight: 400;\">may help. Or maybe not.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Thx, @MrBrian, @abbodi86<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">What do you think about these mangled, useless patches? Join us on the <\/span><\/i><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/january-patch-tuesday-overview\/#post-162617\" rel=\"nofollow\"><i><span style=\"font-weight: 400;\">AskWoody Lounge<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">. <\/span><\/i><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3252025\/microsoft-windows\/windows-surprise-patch-kb-4078130-the-hard-way-to-disable-spectre-2.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security12-100734741-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Mon, 29 Jan 2018 05:49:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">As we crawl deeper down the Meltdown\/Spectre bunny hole, Microsoft released on Friday night a weird, download-only patch that disables the \u201cfix\u201d that\u2019s supposed to protect you against one of the Spectre variants. It\u2019s the same patch, that works the same way, on every version of Windows, from Win7 to the latest Win10 beta builds.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I\u2019m tempted to call it an out-of-band patch, but truth is that all of this month\u2019s patches have been out of band.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You\u2019ve no doubt been inundated by the news about <\/span><a href=\"https:\/\/danielmiessler.com\/blog\/simple-explanation-difference-meltdown-spectre\/\" rel=\"nofollow\"><span style=\"font-weight: 400;\">Meltdown and Spectre<\/span><\/a><span style=\"font-weight: 400;\">, the two (actually, three) highly publicized security vulnerabilities in essentially all modern computer chips that, at this point, has never been seen on a real, live, in-the-wild computer. <\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3252025\/microsoft-windows\/windows-surprise-patch-kb-4078130-the-hard-way-to-disable-spectre-2.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[714,10761],"class_list":["post-11278","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-security","tag-windows-10"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11278"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11278\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}