ASRock.com Homepage
Forum Home Forum Home > Technical Support > AMD Motherboards
  New Posts New Posts RSS Feed - Spectre security updates in AMD BIOSes?
  FAQ FAQ  Forum Search Search  Events   Register Register  Login Login

Spectre security updates in AMD BIOSes?

 Post Reply Post Reply
Author
Message
MinimalTech View Drop Down
Newbie
Newbie


Joined: 14 Mar 2018
Location: Greece
Status: Offline
Points: 60
Post Options Post Options   Thanks (0) Thanks(0)   Quote MinimalTech Quote  Post ReplyReply Direct Link To This Post Topic: Spectre security updates in AMD BIOSes?
    Posted: 16 Mar 2018 at 7:33pm
I have some questions about security updates in the latest BIOS releases from ASRock on AMD platform based motherboards containing the newest PinnaclePI-AM4_1.0.0.1a AGESA.

To begin with,

since January 11, 2018, AMD said that "will make optional microcode updates available to its customers and partners for Ryzen and EPYC processors" for the Spectre Variant 2 vulnerability.

An article also from BleepingComputer.com said at January 15, 2018 that "Intel, AMD, and other CPU manufacturers have started releasing CPU microcode (firmware) updates for processor models affected by the Meltdown and Spectre patches, those updates are trickling down to OEMs and motherboard vendors, who are now integrating these patches into BIOS/UEFI updates for affected PCs."

My system is composed of an ASRock AB350 Pro4 motherboard paired with an AMD Ryzen 5 1600 CPU and G.Skill Flare X 16GB (2x8GB) DDR4-2400MHz RAM. My current version of BIOS is 4.60, released from ASRock at January 26, 2018. The next (and the latest) BIOS from ASRock is 4.70 which released some days before, at March 6, 2018 and includes the PinnaclePI-AM4_1.0.0.1a AGESA from AMD.

So, my questions are:

1) Does AMD released any security microcode update since the announcement at January 11, 2018 or NOT yet?

2) Does the latest AGESA PinnaclePI-AM4_1.0.0.1a includes any kind of security update against Spectre?

3) Does ASRock embedded any security microcode updates in its AMD motherboard BIOSes since AMD's announcement at January 11, 2018 or NOT?

I also want to note that ASRock has a specially designed microsite for Intel platforms that informs users extensively about the Spectre and Meltdown security updates in it's BIOSes, but has not anything informative about AMD platforms concerning security... (Or it has but I didn't notice it?)

I ask you these questions to understand how safe I am with ASRock and AMD and if I must update my BIOS to the latest version to obtain the latest security microcode fixes.
Back to Top
SoniC View Drop Down
Newbie
Newbie
Avatar

Joined: 23 May 2017
Status: Offline
Points: 183
Post Options Post Options   Thanks (0) Thanks(0)   Quote SoniC Quote  Post ReplyReply Direct Link To This Post Posted: 16 Mar 2018 at 9:54pm
I won't answer the questions but I will just add the following : 
AMD is not vulnerable (or almost impossible to use level of vulnerable) to the security holes that require physical updates to BIOS / microcode updates. 
They release it as optional to those wearing tinfoil hats.
Even Linus Torvald felt confident enough to not enable the fixes on AMD hardware in the kernel patches.
So yeah... I believe him.

-=SoniC=-
TR x1950, ASRock X399 FPG (v. 3.33A), G.Skill 3200 CL14 64GB, Enermax LiqTech 280,
AMD Vega 64 LC, 10x HDDs (mostly Hitachi), 2x M.2 (970EVO,960Pro), Xonar DX, AX1200i PSU
Back to Top
MinimalTech View Drop Down
Newbie
Newbie


Joined: 14 Mar 2018
Location: Greece
Status: Offline
Points: 60
Post Options Post Options   Thanks (0) Thanks(0)   Quote MinimalTech Quote  Post ReplyReply Direct Link To This Post Posted: 17 Mar 2018 at 8:23pm
SoniC thank you for your reply, I will try to answer you in detail.

Originally posted by SoniC SoniC wrote:

AMD is not vulnerable (or almost impossible to use level of vulnerable) to the security holes that require physical updates to BIOS / microcode updates.


Do you rely your statement somewhere (e.g. on a specific research)? Can you posted it please here?

However, despite of what you write, the AMD itself writes in its official announcement clearly that:

Google Project Zero (GPZ) Variant 1 (Bounds Check Bypass or Spectre) is applicable to AMD processors.

GPZ Variant 2 (Branch Target Injection or Spectre) is applicable to AMD processors.

GPZ Variant 3 (Rogue Data Cache Load or Meltdown) is not applicable to AMD processors.


Thus, the AMD processors ARE vulnerable since Spectre (Variant 1 & 2) is applicable to them...

Originally posted by SoniC SoniC wrote:

They release it as optional to those wearing tinfoil hats.


I would not label someone who cares for his/her security on his/her system as someone "who wearing tinfoil hat"... There is more than irony of the phrase here... There are malware out there (like spyware, trojan horses, e.t.c.) - even (script-infected) web pages - that would take advantage of this exploit to steal your credentials or your personal files. And if these credentials are for example for your e-banking system or for your credit cards, then you are going to have a huge problem in your life after that...

If we were thinking like this in the IT space, then it would not be necessary to have - lets say for example - strengthened versions of the AES algorithm of 192 bits or 256bits, we would have remained in the 128bits. Same way, it would not be necessary to move from the SSL encryption protocol to the TLS for our web communications...

Originally posted by SoniC SoniC wrote:

Even Linus Torvald felt confident enough to not enable the fixes on AMD hardware in the kernel patches.
So yeah... I believe him.


Linus Torvalds is a formidable person in the Informatics and Software Engineering domains. I admire him and I respect him as a developer I am (plus his opinions) in these domains. But in this case I think you have misunderstood his (and his colleagues) words a bit!!

He (or his colleagues) never said the phrase you wrote it!! Tom Lendacky from AMD said approximately something what you wrote in an e-mail in the Linux Kernel Mailing List in December 26, 2017 and Linus Torvalds accepted that in a Release Candidate of the 4.15 Linux kernel.

But what Tom Lendacky said?

"AMD processors are not subject to the types of attacks that the kernel
page table isolation feature protects against. The AMD microarchitecture
does not allow memory references, including speculative references, that
access higher privileged data when running in a lesser privileged mode
when that access would result in a page fault."


He speaks only for PTI! Which is a feature that mitigates only the Meltdown vulnerability! Not Spectre!!

If I'm not wrong, neither Tom Lendacky nor Linus Torvalds ever said (or agreed) that Spectre is not applicable to AMD processors, so to not enable the fixes in the kernel patches... But if I am wrong in this, please post me a URL of an official statement of someone (or both) of these people.


EDIT: Due to a bug on the parser of the "Insert Hyperlink" function of this forum (on "?" symbol), I write the correct URL of the Release Candidate article straight here: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=00a5ae218d57741088068799b810416ac249a9ce

--

But I think we were going out of subject of the post I made... Linux and its patches is not my subject.

My questions are very simple and clear written!


Edited by MinimalTech - 17 Mar 2018 at 8:33pm
Back to Top
DHYCIX View Drop Down
Newbie
Newbie


Joined: 19 Mar 2018
Status: Offline
Points: 1
Post Options Post Options   Thanks (0) Thanks(0)   Quote DHYCIX Quote  Post ReplyReply Direct Link To This Post Posted: 19 Mar 2018 at 12:55am
I'd also love to hear about this. I got almost the same board as you (just the mATX version). Maybe someone with the latest BIOS of one of these could fire up InSpectre and take a look whether the coast is clear?
Back to Top
stree View Drop Down
Groupie
Groupie
Avatar

Joined: 17 Dec 2015
Location: Lincolnshire
Status: Offline
Points: 264
Post Options Post Options   Thanks (0) Thanks(0)   Quote stree Quote  Post ReplyReply Direct Link To This Post Posted: 19 Mar 2018 at 1:58am
Spectre has been around for years, and was though of such little consequence that is was not worth a mention. Someone would have to be able to physically access your motherboard to even attempt to do anything with it, plus in all the time it has been known about there is not one instance of it being acted upon. Yes it has a shiny new version, but how many exploits?  Only code found "out there" is proof of concept stuff, not rogue exploits.
It only hit the noisy news when Intel needed a distraction from its own more serious ( and actual)  meltathon and proceeded to cripple its server based customers systems. So it shouted loudly that AMD was just as bad, ask them about Spectre!   Corporate infantilisim at its best.
I am aware of spectre . Do I care about whether I am vulnerable to it? Not a jot.
You are fretting over something you need not fret about.
ASRock X370-ITX BIOS 4.50
R5 2600    Cryorig C7
EVGA GTX 950 75w
2x8GB Ballistix Sport LT 2933
960Evo M.2 256GB, Firecuda 1TB
Win 10 Pro 64 1803
G-Unique Archdaemon 300 Watt
Lian-li Q21B
Back to Top
nanohead View Drop Down
Newbie
Newbie


Joined: 07 Feb 2018
Status: Offline
Points: 80
Post Options Post Options   Thanks (1) Thanks(1)   Quote nanohead Quote  Post ReplyReply Direct Link To This Post Posted: 19 Mar 2018 at 4:39am
Have to agree with Stree here.  As someone who's been in the IT space for more than 30 years, I simply don't see this as anything other than more breathless hysteria about something that is massively obscure.  There are tons of minuscule threats in every computer system, and the entire software stack.  Same with networks, and data storage systems.  Why some make into the news and others don't is anyone's guess.
Back to Top
MinimalTech View Drop Down
Newbie
Newbie


Joined: 14 Mar 2018
Location: Greece
Status: Offline
Points: 60
Post Options Post Options   Thanks (0) Thanks(0)   Quote MinimalTech Quote  Post ReplyReply Direct Link To This Post Posted: 24 Mar 2018 at 5:05am
At first sorry for my delayed response (and for any other possible delayed responses in the future), but due to my job I don't have the leisure to respond fast.

Again, I will note that we are getting away of the subject of this thread...! I asked 3 simple questions and all I want is 3 simple answers from ASRock!!

But I will answer to your post (@stree) because I mostly disagree with your opinion.

Originally posted by stree stree wrote:

Someone would have to be able to physically access your motherboard to even attempt to do anything with it


I don't exactly understand what do you mean with the phrase "physically access your motherboard"...

Assuming that with this phrase you don't mean that someone (as a person) has to be in front of the machine with a screwdriver (or any other hand-tool/device) to be able to attempt anything malicious to the motherboard (like to run Spectre code), I have to answer that:

a) the CPU is the module that cares us, not the motherboard,

b) if a programmer develop a malware (virus, trojan, spyware, etc.) and this malware penetrate to a vulnerable-processor system (like PC, Laptop, Tablet, Smartphone) then the malware HAS physical access to the CPU. Just simple. All it has to do this malware is to run a "malicious" algorithm/code and then read the private data. It will act like a program which has been executed manually from the Logged-In user in the system.

and

c) even more simple, a programmer can develop a script in JavaScript and put it - let's say - in an advertisement pop-up window -or- in a main website page and this script will do its job (steal private data from the machine) easily and silently.

With the second implementation the malicious script can still run even if a user has an updated AV program installed... (It is extremely difficult to catch a malicious script)...

Originally posted by stree stree wrote:

Only code found "out there" is proof of concept stuff, not rogue exploits


First of all you don't know if "out there" a rogue exploit already exists until you or a known person of you catch this to your/its machine and to steal your/its private data. There are millions of devices with Intel, AMD and ARM processors connected to the internet, I am assuming that you haven't check every single one of those devices to see if they have been breached and to know that out there there are not rogue exploits...

Secondly, the Proof-of-Concept code you are referring on is the thing that makes the situation much more easy than it should be for a malicious programmer!! Even a moderate-knowledged programmer can develop a malware with Spectre and Meltdown by just COPY and PASTE the code of the proof-of-concept from Google... Don't tell me that you didn't think about it ever...

Originally posted by stree stree wrote:

So it shouted loudly that AMD was just as bad, ask them about Spectre!   Corporate infantilisim at its best.


Maybe you are right in this but I don't care. I am not here to argue for AMD or for Intel companies. I do care only and I am here only as a user for understanding how ASRock cares for its (AMD) clients and if it has released any security microcode updates (in cooperation with AMD) in their BIOSes.

But, once you think that AMD is safe and this is just "Corporate infantilisim", what do you think about this research from the CTS-Labs??

The research reveals that instead of

Spectre Variant 1 and
Spectre Variant 2

the AMD (and only the AMD) is also vulnerable in

Ryzenfall
Masterkey
Fallout
Chimera


vulnerabilities...

Do you still have the same opinion?

Originally posted by stree stree wrote:


I am aware of spectre . Do I care about whether I am vulnerable to it? Not a jot.
You are fretting over something you need not fret about.


Well, that's your opinion and it is respected. My opinion and my point of view as a professional developer is different...

Also I didn't said anywhere that "I am fretting" out with Spectre... I just want my system to be safe, not safe-a-lot...


Again, and for the last time I hope, I asked 3 simple questions and all I want is 3 simple answers to these questions from ASRock, ASRock technicians or from other people who have the answers...


Wink



Edited by MinimalTech - 24 Mar 2018 at 5:42pm
Back to Top
 Post Reply Post Reply
  Share Topic   

Forum Jump Forum Permissions View Drop Down

Forum Software by Web Wiz Forums® version 12.04
Copyright ©2001-2021 Web Wiz Ltd.

This page was generated in 0.141 seconds.