Page 1 of 2
#1 "Spoiler" bug of Intel CPUs by karakarga 18.03.2019 16:30

https://www.techpowerup.com/253285/spoil...ting-intel-cpus

A new security bug called " SPOILER " found. This time nothing to do, (software patch useless, bios update not possible) except buying a post 2020 production Intel CPU, or current AMD processors.

#2 RE:"Spoiler" bug of Intel CPUs by Santa2017 19.03.2019 04:34

avatar

There is not bug inside " SPOILER " at all. Due Intel processor were main platform for a long time since Core 2 Duo. Many of hackers tried to attack it for long milestones.
With lastest Intel VTUNE Amplifier on Parallel Studio XE 2019 can preventing any attacks styles and bring back headroom resources for Intel X86-64 based CPU.

With lastest 0200005A microcode 2019-01-28 Intel bring back performance crown again for all Skylake X SKUs.



#3 RE: by karakarga 19.03.2019 10:20

@Santa2017

Please read the bottom links carefully. I have read many other pages related with it. The patch you have installed, are for Meltdown and Spectre variants. I have installed the patches to my Ivy ~ Sandy bridge CPU's in the summer.

This new bug (yes a bug, called Spoiler) explored in this month, by "Worcester Polytechnic Institute in Massachusetts and the University of Lubeck in Germany" and nothing to do. This one is different than others....

https://www.msspalert.com/cybersecurity-...lity-the-facts/ 7 Mar 2019
https://www.theregister.co.uk/2019/03/05...processor_flaw/ 5 Mar 2019
https://www.amd.com/en/support/kb/faq/pa-240
https://www.theregister.co.uk/2019/02/27...ware_invisible/ 27 Feb 2019

#4 RE:"Spoiler" bug of Intel CPUs by Santa2017 19.03.2019 10:57

avatar

“Speculative execution" were keys of Intel Core Microarchitect enhancement versus other vender CPUs. " SPOILER " or " Spectre " or " L1TF" or anything you'd heard from Internet were target this point as the video link

https://www.youtube.com/watch?v=n_pa2AisRUs

If you've learning more what was Intel tools to address its. First they'd release microcode to mitigation those vulnerables. Next Intel VTune Amplifier on Intel Parallel Studio XE 2019 was
handle the next step to avoid Intel Processors suffered from those vulnerables as here https://software.intel.com/en-us/vtune/f...s/multithreaded

#5 RE:"Spoiler" bug of Intel CPUs by karakarga 19.03.2019 11:02

@Santa2017

This one is too new! It is really too new. Beginning of this month "March 2019" it revealed.

There is no real content related with it on youtube, nor at Intel site yet. The ones you have given as, aged other stuff!

Youtube link dated (Published on Aug 14, 2018) did you understand me?

#6 RE: "Spoiler" bug of Intel CPUs by Fernando 19.03.2019 11:40

avatar

@karakarga @Santa2017
Since this discussion has much more to do with the Sub-Forum "[HOT] CPU Microcode Optimization" than with the UBU Discussion thread, I have created a new thread and moved your recent posts here.
Now I hope, that this is ok for you (and all other Forum visitors).

#7 RE: "Spoiler" bug of Intel CPUs by karakarga 19.03.2019 11:49

@Fernando

Zitat von Fernando im Beitrag #6
Since this discussion has much more to do with the Sub-Forum "[HOT] CPU Microcode Optimization" than with the UBU Discussion thread...
UBU itself is mainly (my belief) for CPU microcode, other stuff are optional things in it. People must be aware of, what they can do, or not for their systems!

#8 RE: "Spoiler" bug of Intel CPUs by Fernando 19.03.2019 12:05

avatar

Zitat von karakarga im Beitrag #7
UBU itself is mainly (my belief) for CPU microcode, other stuff are optional things in it.
You are wrong. All UBU tasks are optional. The first and most important options SoniX had implemented were the updates of Option ROM modules.
Zitat von karakarga im Beitrag #7
People must be aware of, what they can do, or not for their systems!
It is up to the UBU user him/herself to get the required information to decide, which ones of the various UBU options he/she wants to use.
Do you really think, that in the near future Forum visitors and UBU users will find and read your discussion about the actual or supposed "Spoiler" vulnerability bug on page 331 of the UBU Discussion thread?

#9 RE: "Spoiler" bug of Intel CPUs by Santa2017 19.03.2019 13:10

avatar

Zitat
@Santa2017
This one is too new! It is really too new. Beginning of this month "March 2019" it revealed.
There is no real content related with it on youtube, nor at Intel site yet. The ones you have given as, aged other stuff!
Youtube link dated (Published on Aug 14, 2018) did you understand me?

" SPOILER " or any Speculative Execution vulnerables solution must be coming from both Hardware and Software sides.

If you see history of Spectre Variant 1-4 since 2017 through present day. Both OS kernel (All platform Windows / Mac OS / Linux etc )
and CPU Microcode ( Hardware side Intel ARM AMD) were release to address those vulnerables at last.

History will repeat on " SPOILER " or any new vulnerables soon. Don't be panic , at least there are no loss from " SPOILER " more when
compare to those Spectre Variants 1-4 and Meltdown.

#10 RE: "Spoiler" bug of Intel CPUs by karakarga 19.03.2019 13:12

Zitat von Fernando im Beitrag #8
All UBU tasks are optional.
I do not believe in that, They are necessary, I believe. Nevertheless some are from "https://github.com/platomav/CPUMicrocodes" which are original brands production. I am following this site for updates for older systems, which lost support.

I don't want to open a discussion about UBU.....

#11 RE: "Spoiler" bug of Intel CPUs by karakarga 19.03.2019 13:42

@Santa2017

"... History will repeat on " SPOILER " or any new vulnerables soon. Don't be panic... "

Panic? Hmm.... Can Cylons or Terminators take over and run nuclear missiles? No, no. I am not panicing....

#12 RE: "Spoiler" bug of Intel CPUs by Fernando 19.03.2019 14:10

avatar

Zitat von karakarga im Beitrag #10
Zitat von Fernando im Beitrag #8
All UBU tasks are optional.
I do not believe in that, They are necessary, I believe.
You may have the opinion, that the update of the CPU Microcode is necessary for you, but it is up to the other users to decide this themselves. In this case the decision depends on the priority, which has been set by the user (safety or performance).

#13 RE: "Spoiler" bug of Intel CPUs by Santa2017 19.03.2019 15:19

avatar

Zitat von karakarga im Beitrag #11
@Santa2017
"... History will repeat on " SPOILER " or any new vulnerables soon. Don't be panic... "
Panic? Hmm.... Can Cylons or Terminators take over and run nuclear missiles? No, no. I am not panicing....
Maybe Santa2017 will terminated the T-850 , T-1000 and especially T-X by new microcode before they'd start their misson to hunt karakarga corner.


OK. Back to topic buddy. The speculative execution unit vulnerables of Intel CPU issue were coming from these cause.
https://www.youtube.com/watch?v=pi2ftnlfImo

Intel already acknowledged all vulnerables cause speculative execution attack as you see from those video link.

They'd already fixed exist CPU family since Nehalem to Cannonlake and also Comet lakes and Icelake.
Some model of CPU they'd release microcode for mitigation those vulnerables within work co-operating with Microsoft Apple and all Linux venders to optimized their OS kernels
working with those microcode for minimum performance impacted.

Some model of CPU such as Cascade Lake Cooperlake Icelake SP had hardware fixed in silicon already.

For Example Icelake U here



The RED rectangular around was new instruction to protect against Spectre V1-4 and also L1TF vulnerables. These called " Hardware Silicon Fixed " .

So, Don't panic on " SPOILER " vulnerables to launch NUKE at all. It'll be " TERMINATED SOON " .

#14 RE: "Spoiler" bug of Intel CPUs by Santa2017 21.03.2019 04:43

avatar

Zitat von plutomaniac im Beitrag #4970
Your MCE DB is outdated, you can update it from Github.


There is new Skylake X 0200005D Microcode Protected Against " SPOILER " DATE 2019-03-21 Release Inside Microsoft Windows 10 # 2020H1 #
Insider Preview 18860.1001 Kernel. Could you search for other source binary file for us.









@karakarga As I said " SPOILER " are terminated . Maybe faster than your imagine

#15 RE: "Spoiler" bug of Intel CPUs by karakarga 21.03.2019 08:14

@Santa2017
From the pictures you have inserted, I still can not see " Spoiler " patch related fix! ???
I can see at top picture;
Microcode Rev. 0x200005D > Spectre (CVE-2017-5715) Patched < but, not related with " Spoiler " fix?

According to: https://blog.rapid7.com/2018/01/04/meltd...-cve-2017-5754/
Updates
January 5, 2018: We have added Meltdown and Spectre vulnerability checks to InsightVM and Nexpose for Windows and VMware and will continue to add coverage as vendors publish mitigations for CVE-2017-5715, CVE-2017-5753, and CVE-2017-5754. We have also added a dashboard to InsightVM to provide visibility and tracking for Meltdown, and will continue to incorporate new insights. The Meltdown dashboard is available in the R7 Dashboard template library within InsightVM, ....


The update is still missing for " Spoiler " that patch is dated "January 5, 2018"

By the way, you are using an older bios version than the latest Version 1704 2019/02/21 please update your bios first!

Xobor Forum Software von Xobor
Datenschutz