01-02-2018 11:05 PM - last edited on 03-06-2024 09:57 PM by ROGBot
01-15-2018 08:29 AM
restsugavan wrote:
Absolutely yes , at least your system has fully protected and free from Spectre and ME Firmware vulnerables.
Shame on my Rampage VI Extreme there are no updates for the most expensive x299 mobo ever made.*
We will get money refund to support EVGA products soon.*
01-15-2018 09:16 AM
karserasl wrote:
User interaction? Access locally? LOOOOOOLL!
https://repl.it/repls/DeliriousGreenOxpecker
Check it out if you didnt patch your BIOS. Its a small test reading your WHOLE chrome session from memory. (OK not whole session, its a test. It will output "The Magic Words are Squeamish Ossifrage." from memory vertically)
So that means, you went to bank account and login, and then just came across this small js, which could be ANYWHERE, in ads, in iframes anywhere, and your bank account is stolen.
Tell me again how small is this problem.
01-15-2018 12:48 PM
01-15-2018 05:51 PM
01-10-2018 09:47 AM
Margus wrote:
asus told its 5 years old and no updates planned anymore witch is bad thinking for sutch issue.
01-10-2018 09:51 AM
01-10-2018 10:04 AM
01-10-2018 10:38 AM
TrevorK wrote:
I'm using an i7-920 on the Rampage III Formula. This is an older motherboard with an X58 chipset.
The system itself is still quite capable of playing modern games. It is certainly more than enough to browse the internet or do MS Office for kids in school.
From post #161, we know Intel has provided the microcode fix for A LOT of legacy processors, including the i7-920.
So, I'm going to be forced to buy a new system, paying new system pricing, only to have it gimped because all Intel CPUs are vulnerable at this moment.
If I buy a new motherboard, new RAM, new processor, etc. then I am glad I have choices.
ASUS, you WILL lose a long time customer if there is no BIOS update for my Rampage III Formula motherboard to fix this stupid Intel BS.
01-10-2018 09:09 AM
AndyU wrote:
At first, thank you for the URL to the binary2ascii microcode converter!
Two questions:
1) Did you try to restart computer? MIcrocode could survive during this process.
2) Do you have registry keys (https://support.microsoft.com/en-ca/help/4072698/windows-server-guidance-to-protect-against-the-spec...), which explicitly enable MS update?
3) Could you please show the output of Get-SpeculativeControlSettings?
01-10-2018 09:46 AM
firefox2026 wrote:
I also used the new latest linux module that intel came out with and the microcode was a newer version than what I got out of the debian build.
1)So far when I restart the computer the driver updates the CPU microcode and I check it with the SIW tool.
2) I tried to update the registry keys and that didn't seem to help.
3)
PS C:\script\SpeculationControl> Get-SpeculationControlSettings
Speculation control settings for CVE-2017-5715 [branch target injection]
Hardware support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is enabled: False
Windows OS support for branch target injection mitigation is disabled by system policy: False
Windows OS support for branch target injection mitigation is disabled by absence of hardware support: False
Speculation control settings for CVE-2017-5754 [rogue data cache load]
Hardware requires kernel VA shadowing: True
Windows OS support for kernel VA shadow is present: True
Windows OS support for kernel VA shadow is enabled: True
Windows OS support for PCID performance optimization is enabled: True [not required for security]
Suggested actions
* Follow the guidance for enabling Windows Client support for speculation control mitigations described in https://support.microsoft.com/help/4073119
BTIHardwarePresent : True
BTIWindowsSupportPresent : True
BTIWindowsSupportEnabled : False
BTIDisabledBySystemPolicy : False
BTIDisabledByNoHardwareSupport : False
KVAShadowRequired : True
KVAShadowWindowsSupportPresent : True
KVAShadowWindowsSupportEnabled : True
KVAShadowPcidEnabled : True