Major Intel CPU vulnerability
-
@jaredbusch said in Major Intel CPU vulnerability:
@scottalanmiller said in Major Intel CPU vulnerability:
A base Windows license core count is sixteen. So dual proc EPYC 7251 or single proc 7281, 7301, 7351, or 7351P procs incur no Windows licensing penalties.
This is not correct unless Microsoft has updated their terms in the last 12 months and I have not heard about it.
The core based licensing that came out at the time of Server 2016 is a 16 core minimum, but that is also a 2 socket minimum. Not 16 cores on a single processor.
I kind of what to agree about the two socket part, but for some reason I'm now thinking it was 2 socket maximum 16 core minimum. . .
-
So this bit is from this PDF about server 2016 licensing (guide from MS)
-
All physical cores on the server must be licensed, subject to a minimum of 8 core licenses per physical
processor and a minimum of 16 core licenses per server -
Core licenses are sold in packs of two.
- 8 two-core packs will be the minimum required to license each physical server. The two-core pack for
each edition is 1/8th the price of a license for a 2-processor server for corresponding Windows Server
2012 R2 editions
- 8 two-core packs will be the minimum required to license each physical server. The two-core pack for
I would take this to mean you can still have a single processor server, but no matter what you're buying for a dual processor server with a minimum of 16 cores (split across 1 or 2 processors).
-
-
So the part that really matters in the guide is this.
- 8 two-core packs will be the minimum required to license each physical server.
Microsoft doesn't seem to care about how the physical layout of your CPU setup is, so long as you're meeting the requirements.
-
@jimmy9008 said in Major Intel CPU vulnerability:
Does the update have a KB number and is it rolled out to supported devices via Windows Update?
I haven't seen them listed on any of the advisory pages, but this comes from the PatchManagement.org mailing list.
https://support.microsoft.com/en-us/help/4056893 (1507)
https://support.microsoft.com/en-us/help/4056888 (1511)
https://support.microsoft.com/en-us/help/4056890 (1607, Windows Server 2016)
https://support.microsoft.com/en-us/help/4056891 (1703)
https://support.microsoft.com/en-us/help/4056892 (1709)Edit: From BleepingComputer
https://support.microsoft.com/en-us/help/4056897 (Windows 7 SP 1, Windows Server 2008 R2 SP1)
https://support.microsoft.com/en-us/help/4056898 (Windows 8.1, Windows Server 2012 R2)They'll be out on Windows Update, and are already downloadable from the Windows Update Catalog. Again, they will only show in Windows Update if the registry condition is correct.
-
Michael Schwarz: "Using Meltdown to steal passwords in real-time" https://twitter.com/misc0110/status/948706387491786752
-
@dustinb3403 said in Major Intel CPU vulnerability:
So the part that really matters in the guide is this.
- 8 two-core packs will be the minimum required to license each physical server.
Microsoft doesn't seem to care about how the physical layout of your CPU setup is, so long as you're meeting the requirements.
This only makes sense - the physical sockets really don't matter anymore. It's good to see Licensing attempting to keep up.
-
I called up my AV vendor (Panda Security). They claim that they have tested against the new MS patches and currently there are no issues.
That said, they are still doing additional testing and have not released an update that inserts the registry key required so that Windows will auto update itself yet.
Their plan was to release their update Tuesday of next week (patch Tuesday) alongside Microsoft's update. The press releasing the information about the issue early has put them a bit behind, but they are still planning on releasing their AV update to insert the registry key.
-
Anyone else have any info on their AV provider?
-
@dashrender said in Major Intel CPU vulnerability:
Anyone else have any info on their AV provider?
SEP needs to be patched before the OS can be patched. Not surprising, considering it is Symantec.
-
Panda's page for Meltdown and Spectre
https://www.pandasecurity.com/uk/support/card?id=100059
Sadly, they aren't email blasting customers about this, instead they are waiting for customers to call to be added to an info alert list.
-
Does anybody know if Dell have released firmware for T630 server for the hardware? I cant seem to find that info on Dells site...
-its ok, think I've found it, and its this... Update
-
@jimmy9008 said in Major Intel CPU vulnerability:
Does anybody know if Dell have released firmware for T630 server for the hardware? I cant seem to find that info on Dells site...
-its ok, think I've found it, and its this... Update
Damn, on the bleeding edge on that one.
I looked for some HP things yesterday - nada.
I'm guessing by the end of January, we'll start seeing more firmware updates.
Now the question is, how far back are the vendors going to go?
-
@dashrender said in Major Intel CPU vulnerability:
@jimmy9008 said in Major Intel CPU vulnerability:
Does anybody know if Dell have released firmware for T630 server for the hardware? I cant seem to find that info on Dells site...
-its ok, think I've found it, and its this... Update
Damn, on the bleeding edge on that one.
I looked for some HP things yesterday - nada.
I'm guessing by the end of January, we'll start seeing more firmware updates.
Now the question is, how far back are the vendors going to go?
The new generation Servers are being patched faster at least by Dell. -
HMMM... —
Intel CEO sold all the stock he could after Intel learned of security bugI literally quoted the title as it says everything I could. . .
-
@dustinb3403 said in Major Intel CPU vulnerability:
HMMM... —
Intel CEO sold all the stock he could after Intel learned of security bugI literally quoted the title as it says everything I could. . .
That sounds suspiciously like insider trading.
-
@coliver That is why an investigation appears to be prepared in this.
-
@coliver said in Major Intel CPU vulnerability:
@dustinb3403 said in Major Intel CPU vulnerability:
HMMM... —
Intel CEO sold all the stock he could after Intel learned of security bugI literally quoted the title as it says everything I could. . .
That sounds suspiciously like insider trading.
hard to say.. the whole Scheduled for sale thing will be the key.
-
@dashrender said in Major Intel CPU vulnerability:
@coliver said in Major Intel CPU vulnerability:
@dustinb3403 said in Major Intel CPU vulnerability:
HMMM... —
Intel CEO sold all the stock he could after Intel learned of security bugI literally quoted the title as it says everything I could. . .
That sounds suspiciously like insider trading.
hard to say.. the whole Scheduled for sale thing will be the key.
Scheduled for sale after Intel management knew about the issue for over 5 months and before it was disclosed publicly that there was any issue.
Even if he made the same amount of capital from the sale as if he sold today it's still protecting "his" money.
-
@coliver said in Major Intel CPU vulnerability:
@dustinb3403 said in Major Intel CPU vulnerability:
HMMM... —
Intel CEO sold all the stock he could after Intel learned of security bugI literally quoted the title as it says everything I could. . .
That sounds suspiciously like insider trading.
And by suspiciously like, more like exactly like.
-