Is it possible to patch ZombieLoad Vulnerability on 10.14.4 without updating to 10.14.5?
Thank you,
Greg.
Thank you,
Greg.
Is it possible to patch ZombieLoad Vulnerability on 10.14.4 without updating to 10.14.5?
Thank you,
Greg.
Is it possible to patch ZombieLoad Vulnerability on 10.14.4 without updating to 10.14.5?
Thank you,
Greg.
Apple does not say how much of the "mitigation" for the "Microarchitectural Data Sampling (MDS)" is done via code in the BootROM vs. macOS on the disk. The BootROM will be updated in 10.14.5 for Macs which can officially run Mojave. One of the NVRAM parameters Apple says you should change for full mitigation (SMTDisable) didn't have any effect on my 2012 Mini before I updated with the recent High Sierra security patch (Currently, Apple looks like it updates the BootROM's for all of the currently supported OS's at the same time.). But after the BootROM update, I can run the OS update prior to current update and the NVRAM parameter works. So I suspect the same is true of other Macs. So it is possible to run the update on a clone external disk or the internal disk and revert and you'll get the BootROM update - but as I mentioned before, Apple doesn't say how much of the mitigation is contained in the BootROM. For most users, I don't suggest this as a recommended action (it's a bit of work and it's not entirely risk-free) - I would agree with the sentiments of the other posters.
I've done this successfully in the past. As far as I'm aware, it doesn't prevent runtime issues (like MDS and the like), but more cold boot or warm boot attacks. Once you're in the OS EFI won't help you muchIt is also possible to update firmware (BootROM and more) without actually installing the OS. See this paper for more details:
https://duo.com/assets/ebooks/Duo-Labs-The-Apple-of-Your-EFI.pdf
I've done this successfully in the past. As far as I'm aware, it doesn't prevent runtime issues (like MDS and the like), but more cold boot or warm boot attacks. Once you're in the OS EFI won't help you much
Just did the update on my late 2012 iMac, haven't checked the older MBP but I assume there is no patch for it?
You are generally speaking correct. There are certain exploits the firmware version could protect you against, even without OS-level protection, like Thunderstrike, but in most cases you're entirely right that it's mainly a pre-boot protection and the OS should still be patched separately.
My 2010 13" MBP got a firmware update with the latest 10.13.6 security patch, but that CPU doesn't support Hyper-Threading and won't get a microcode update from Intel, so I don't know what the update changed.Just did the update on my late 2012 iMac, haven't checked the older MBP but I assume there is no patch for it?
My 2010 13" MBP got a firmware update with the latest 10.13.6 security patch, but that CPU doesn't support Hyper-Threading and won't get a microcode update from Intel, so I don't know what the update changed.
There are mixed messages on this here: https://support.apple.com/en-us/HT210107This is a good point. Apple's page on what's addressed in it's current round of security updates is at:
https://support.apple.com/en-us/HT210119
Is there any performance degradation after the update (if I don't enable the full mitigation manually)? (MacBook Pro Mid 2018)
Is there any performance degradation after the update (if I don't enable the full mitigation manually)? (MacBook Pro Mid 2018)
There are mixed messages on this here: https://support.apple.com/en-us/HT210107
The 2010 MBP, among other older models is listed under this header: "These Mac models may receive security updates in macOS Mojave, High Sierra or Sierra, but are unable to support the fixes and mitigations due to a lack of microcode updates from Intel."
So, even without Hyper-threading there seems to be an issue on these older computers.