by tomtoise on 1/29/18, 6:31 AM with 315 comments
by zingmars on 1/29/18, 3:20 PM
by tjoff on 1/29/18, 9:08 AM
This actually made the system boot but there are some leftovers being installed on first boot that I've been unable to disable that also causes the system to be unable to boot.
So now, the machine is running but as soon as it is restarted we have to re-image the disk, go through the process of manually removing patches, and then pray that we don't have a power shortage as we'd have to do everything yet again on next boot.
I'm not convinced that this patch will solve the issue either, because if this updates requires a reboot the fix won't be installed if we can't boot. I might try to install this update from the recovery console see if that works.
Quite frustrating.
by cesarb on 1/29/18, 10:56 AM
That patch disables the use by the kernel of the new IBPB/IBRS features provided by the updated microcode, when it's of a "known bad" revision. Since Linux prefers the "retpoline" mitigation instead of IBRS, and AFAIK so far the upstream kernel (and most of the backports to stable kernels) doesn't use IBPB yet, that might explain why Linux seems to have been less affected by the microcode update instabilities than Windows.
Also interesting: that patch has a link to an official Intel list of broken microcode versions.
by ComodoHacker on 1/29/18, 9:52 AM
There is an interesting paradox in our industry. If you pay enough attention (read: money) to security, you will be late to the market, your costs will be high and you lose profit. If you don't pay enough attention, you take the market, get your profits, but your product (be it hardware or software) and reputation will be screwed later. And worst of all: there's never enough attention to security.
So by simple logic, an optimal strategy is to forge your product quickly, take your profits within a [relatively] short period and vanish from the market. I guess we'll see this strategy executed from IoT vendors when market start to punish them for their bad sec.
For Intel, that "long period" just happened to be REALLY long.
by stinos on 1/29/18, 8:39 AM
What's next? Repeat? Sounds like this could turn into a maintainance nightmare quickly. Also because I've introduced things like that myself in the past, and that was for normal applications and not a kernel or OS. Somewhere, someday, there's usually this one exception for which none of your rules hold true and the thing blows up in your face. Anyway, I'd love to see the actual code for this. Not a chance probably?
by PerusingAround on 1/29/18, 2:05 PM
by HugoDaniel on 1/29/18, 10:37 AM
by tallanvor on 1/29/18, 9:46 AM
Intel certainly isn't making any friends these days...
by notspanishflu on 1/29/18, 10:51 AM
https://www.bleepingcomputer.com/news/microsoft/microsoft-is...
by mosselman on 1/29/18, 1:04 PM
by megaman22 on 1/29/18, 9:39 AM
by nippples on 1/29/18, 8:46 AM
by Thimothy on 1/29/18, 11:14 AM
I still haven't had the time to debug it, but I wonder how many people are out there with their OS silently refusing to update.
by speedie on 1/29/18, 1:31 PM
by ohiovr on 1/29/18, 11:57 AM
by shultays on 1/29/18, 10:30 AM
by bartl on 1/29/18, 6:19 PM
I sure hope Intel will face a class action suit over this botched update. Many professionals have wasted countless hours dealing with this junk.
by cjsuk on 1/29/18, 8:05 AM
by chrisper on 1/29/18, 8:00 AM
by mm-vorticesoft on 1/29/18, 8:08 AM
by debt on 1/29/18, 7:50 PM
A part of me feels this stories like this are going to keep getting worse until Spectre is finally used in the wild.
by dsign on 1/29/18, 3:47 PM
The day this blew up we rented our first physical server for the express purpose of running secure critical workloads in unpatched environments. Yes, I know that there is nothing secure, but not everything we do is running a chunk of logic uploaded by an attacker, so we will take our chances.
by hi41 on 2/1/18, 6:49 PM
by Roritharr on 1/29/18, 8:34 PM
by kuon on 1/29/18, 1:31 PM
by mehrdadn on 1/29/18, 9:20 AM
by mark_l_watson on 1/29/18, 11:46 AM
by rootw0rm on 1/29/18, 9:57 AM
by IanSanders on 1/29/18, 1:29 PM