Page 4 of 12 FirstFirst 1234567 ... LastLast
Results 49 to 64 of 186

Thread: Intel processor security flaw requires OS kernel level fix

  1. #49
    Senior Member kalniel's Avatar
    Join Date
    Aug 2005
    Posts
    28,487
    Thanks
    1,373
    Thanked
    2,787 times in 2,266 posts
    • kalniel's system
      • Motherboard:
      • Gigabyte X58A UD3R rev 2
      • CPU:
      • Intel i7 950
      • Memory:
      • 12gb DDR3 2000
      • Graphics card(s):
      • AMD HD7870
      • PSU:
      • XFX Pro 650W
      • Case:
      • Cooler Master HAF 912
      • Operating System:
      • Win 7 Pro x64
      • Monitor(s):
      • Dell U2311H
      • Internet:
      • O2 8mbps

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by Biscuit View Post
    So in actual fact, very few "core" chips are in the "you MUST upgrade" catagory, and those that are, are so old that really those people should be considering an upgrade anyway?
    Hmpf.. the 950 performs perfectly well thank you.. though maybe at -30% I could be persuaded to upgrade. X5680 here I come...

  2. #50
    IQ: 1.42
    Join Date
    May 2007
    Location
    old trafford
    Posts
    938
    Thanks
    107
    Thanked
    48 times in 46 posts
    • Tunnah's system
      • Motherboard:
      • Asus P8P67 PRO
      • CPU:
      • Core i7 2700K
      • Memory:
      • 12GB DDR3-1600
      • Storage:
      • Various SSDs, 90TB RAID6 HDDs
      • Graphics card(s):
      • 1080Ti
      • PSU:
      • Silverstone 650w
      • Case:
      • Lian-Li PC70B
      • Operating System:
      • Win10
      • Internet:
      • 40mbit Sky Fibre

    Re: Intel processor security flaw requires OS kernel level fix

    Really could do with an overview of the type of tasks this affects. If they're everyday tasks that don't strain the CPU then it doesn't matter (to me), however if it's going to noticeably slow down tasks that already use up all the performance of the CPU then it's a bloody big deal!

  3. #51
    Registered+
    Join Date
    Apr 2006
    Posts
    73
    Thanks
    0
    Thanked
    0 times in 0 posts

    Re: Intel processor security flaw requires OS kernel level fix

    "or go buy a new processor without the design blunder" such as? AMD only? Crikey
    I don't feel like giving more money to the saudis

  4. #52
    Senior Member watercooled's Avatar
    Join Date
    Jan 2009
    Posts
    10,299
    Thanks
    1,449
    Thanked
    858 times in 744 posts

    Re: Intel processor security flaw requires OS kernel level fix

    What a bizarre thing to say. AMD is a publicly traded American company - if you want to avoid giving money to a certain country at any point in the supply chain for whatever strange reason, you better avoid Intel too and go live in the woods or something. Certainly stay away from any plastics or petroleum products!

  5. Received thanks from:

    Pleiades (04-01-2018)

  6. #53
    Oh Crumbs.... Biscuit's Avatar
    Join Date
    Feb 2007
    Location
    N. Yorkshire
    Posts
    10,843
    Thanks
    1,296
    Thanked
    1,012 times in 781 posts
    • Biscuit's system
      • Motherboard:
      • ASRock Z77 Pro4-M
      • CPU:
      • Intel i5 3570 (Be Quiet! Dark Rock 3)
      • Memory:
      • 16GB Crucial DDR3 1866MHz
      • Storage:
      • 240GB Crucial M4, 480GB Crucial M500, 2TB Seagate SSHD
      • Graphics card(s):
      • Sapphire R9 290X Vapor-X
      • PSU:
      • XFX 650W
      • Case:
      • Lian Li PC-V359
      • Operating System:
      • Windows 7 x64
      • Monitor(s):
      • Dell U2913WM & Philips E-line 234EL2SB
      • Internet:
      • BT Infinity 80/20

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by kalniel View Post
    Hmpf.. the 950 performs perfectly well thank you.. though maybe at -30% I could be persuaded to upgrade. X5680 here I come...
    I said "considering", and I'm going to go out on a limb and suggest that the thought has crossed your mind even before this announcement


    Quote Originally Posted by Iota View Post
    My 2600k is doing just fine for everything I do with my PC
    Sandybridge is post Westmere
    Last edited by Biscuit; 03-01-2018 at 08:52 PM.

  7. #54
    Senior Member watercooled's Avatar
    Join Date
    Jan 2009
    Posts
    10,299
    Thanks
    1,449
    Thanked
    858 times in 744 posts

    Re: Intel processor security flaw requires OS kernel level fix

    TBF it's probably not going to be as bad as 30%, or even 10%, in consumer workloads. The way I understand it at the moment (which is admittedly from skim-reading a couple of articles), this first round of patches is more of an emergency fix with the possibility of better-optimised workarounds coming later? A couple of demanding consumer workloads such as gaming and video encoding don't seem to be too badly affected according to Phoronix's tests, though of course they're Linux so it could be different on Windows.

    I'm very interested to see this put to the test though! And furthermore, if any future patches do improve things, it's only fair to post updated results when they're available.

  8. #55
    Senior Member
    Join Date
    Dec 2003
    Location
    Wilmslow
    Posts
    488
    Thanks
    183
    Thanked
    84 times in 62 posts
    • mtyson's system
      • Motherboard:
      • Gigabyte GA-B85M-HD3
      • CPU:
      • Intel Core i7 4790T
      • Memory:
      • 8GB
      • Storage:
      • Sandisk 128GB SSD + Seagate 750GB HDD
      • Graphics card(s):
      • Gigabyte Windforce GTX 660OC
      • PSU:
      • Corsair 400W
      • Case:
      • Zalman Z9 Plus
      • Operating System:
      • Windows 10
      • Monitor(s):
      • Acer IPS 24-inch 1080p
      • Internet:
      • 50MB Virgin fibre

    Re: Intel processor security flaw requires OS kernel level fix

    Story has been updated with an official response from Intel:

    Intel has officially responded to the security flaw reports in an email to HEXUS and via its official Newsroom Blog. In a nutshell it has issued a denial of sorts, saying that any exploits via flaws are not unique to Intel products. It then mentions how it is working closely with the likes of AMD, ARM Holdings and several operating system vendors to solve the issues discussed in the news above. Below is an excerpt of the statement for your convenience, or you can digest the full Intel blog post at the link above.

    "Intel and other technology companies have been made aware of new security research describing software analysis methods that, when used for malicious purposes, have the potential to improperly gather sensitive data from computing devices that are operating as designed. Intel believes these exploits do not have the potential to corrupt, modify or delete data.

    Recent reports that these exploits are caused by a “bug” or a “flaw” and are unique to Intel products are incorrect. Based on the analysis to date, many types of computing devices — with many different vendors’ processors and operating systems — are susceptible to these exploits.

    Snip

    Intel believes its products are the most secure in the world and that, with the support of its partners, the current solutions to this issue provide the best possible security for its customers."
    Last edited by mtyson; 03-01-2018 at 09:43 PM. Reason: indents

  9. Received thanks from:

    peterb (03-01-2018),The Hand (03-01-2018)

  10. #56
    Admin Team peterb's Avatar
    Join Date
    Aug 2005
    Location
    Southampton
    Posts
    17,209
    Thanks
    2,224
    Thanked
    2,785 times in 2,226 posts
    • peterb's system
      • Motherboard:
      • Nascom 2
      • CPU:
      • Z80B
      • Memory:
      • 48K 8 bit memory on separate card
      • Storage:
      • Audio cassette tape - home built 5.25" floppy drive
      • Graphics card(s):
      • text output (composite video)
      • PSU:
      • Home built
      • Case:
      • Home built
      • Operating System:
      • Nas-sys
      • Monitor(s):
      • 12" monocrome composite video input
      • Internet:
      • No networking capability on this machine

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by mtyson View Post
    Story has been updated with an official response from Intel:

    Intel has officially responded to the security flaw reports in an email to HEXUS and via its official Newsroom Blog. In a nutshell it has issued a denial of sorts, saying that any exploits via flaws are not unique to Intel products. It then mentions how it is working closely with the likes of AMD, ARM Holdings and several operating system vendors to solve the issues discussed in the news above. Below is an excerpt of the statement for your convenience, or you can digest the full Intel blog post at the link above.

    <snip>
    The cynic in me wonders if this is a damage limitation exercise given the volatility in the Intel share price.

    On the other hand, there has been a lot of speculation about the effects of the patch and the risks of the ‘exploit’ and lets face it, bad news is good news for some media outlets - nothing like a bit of sensationalism to generate readers.

    So it will be interesting to see what the real world effects are wh3n the patches are released - presumably next week.
    (\__/)
    (='.'=)
    (")_(")

    Been helped or just 'Like' a post? Use the Thanks button!
    My broadband speed - 750 Meganibbles/minute

  11. #57
    Senior Member
    Join Date
    Feb 2009
    Location
    Castle Gresley
    Posts
    627
    Thanks
    28
    Thanked
    18 times in 18 posts
    • marshalex's system
      • Motherboard:
      • Asus P6T bios 1303
      • CPU:
      • Intel Core i7 920 @ 3.8Ghz
      • Memory:
      • 12GB Kingston Hyper X DDR3 1600MHz
      • Storage:
      • Samsung 840, WD Caviar Black 640Gb, WD Caviar Blue 1TB
      • Graphics card(s):
      • XFX Radeon HD 6950 XXX @915 MHz
      • PSU:
      • Antec TruePower New 650W
      • Case:
      • Coolermaster CM690
      • Operating System:
      • Windows 7 Professional x64
      • Monitor(s):
      • Dell ST2210
      • Internet:
      • Sky Fibre 38MB

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by mtyson View Post
    Story has been updated with an official response from Intel:

    Intel has officially responded to the security flaw reports in an email to HEXUS and via its official Newsroom Blog. In a nutshell it has issued a denial of sorts, saying that any exploits via flaws are not unique to Intel products. It then mentions how it is working closely with the likes of AMD, ARM Holdings and several operating system vendors to solve the issues discussed in the news above. Below is an excerpt of the statement for your convenience, or you can digest the full Intel blog post at the link above.

    "Intel and other technology companies have been made aware of new security research describing software analysis methods that, when used for malicious purposes, have the potential to improperly gather sensitive data from computing devices that are operating as designed. Intel believes these exploits do not have the potential to corrupt, modify or delete data.

    Recent reports that these exploits are caused by a “bug” or a “flaw” and are unique to Intel products are incorrect. Based on the analysis to date, many types of computing devices — with many different vendors’ processors and operating systems — are susceptible to these exploits.

    Snip

    Intel believes its products are the most secure in the world and that, with the support of its partners, the current solutions to this issue provide the best possible security for its customers."
    Didn’t AMD come out when this story broke and state it didn’t affect their products?

  12. #58
    Kaplah! OilSheikh's Avatar
    Join Date
    Jun 2007
    Location
    Londinium
    Posts
    5,167
    Thanks
    1,453
    Thanked
    281 times in 227 posts
    • OilSheikh's system
      • Motherboard:
      • ASUS P8P67
      • CPU:
      • i7 2600 w Xigmatek Thor's Hammer+ Noctua 14cm silent fan
      • Memory:
      • 8GB Crucial Ballistix Elite Tracer 1600MHz DDR3
      • Storage:
      • Samsung 850 Evo 120GB SSD + 1TB SAMSUNG F3 + 160GB SEAGATE USB 3.0 Backup HDD
      • Graphics card(s):
      • MSI R9 380 OC
      • PSU:
      • Seasonic 600W
      • Case:
      • ZALMAN Z9 PLUS
      • Operating System:
      • Windows 7 Pro
      • Monitor(s):
      • 22" Samsung TOC
      • Internet:
      • 80Mbps Plusnet

    Re: Intel processor security flaw requires OS kernel level fix

    How come it took them so many years to find this flaw ?

  13. #59
    Admin Team peterb's Avatar
    Join Date
    Aug 2005
    Location
    Southampton
    Posts
    17,209
    Thanks
    2,224
    Thanked
    2,785 times in 2,226 posts
    • peterb's system
      • Motherboard:
      • Nascom 2
      • CPU:
      • Z80B
      • Memory:
      • 48K 8 bit memory on separate card
      • Storage:
      • Audio cassette tape - home built 5.25" floppy drive
      • Graphics card(s):
      • text output (composite video)
      • PSU:
      • Home built
      • Case:
      • Home built
      • Operating System:
      • Nas-sys
      • Monitor(s):
      • 12" monocrome composite video input
      • Internet:
      • No networking capability on this machine

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by OilSheikh View Post
    How come it took them so many years to find this flaw ?
    Probably because no-one was looking for it. I guess it was stumbled on by chance. There has been a lot of work recently in reverse engineering the Intel Management Engine and this could have come to light during that work (even though the two seem to be otherwise unrelated)

    Lots of bugs have been around a long time. The shell shock bug was around for 30 years without causing problems, and was only discovered when other software advances started using that particular shell command in novel ways.
    (\__/)
    (='.'=)
    (")_(")

    Been helped or just 'Like' a post? Use the Thanks button!
    My broadband speed - 750 Meganibbles/minute

  14. #60
    Member
    Join Date
    May 2009
    Location
    Where you are not
    Posts
    159
    Thanks
    10
    Thanked
    12 times in 8 posts
    • Iota's system
      • Motherboard:
      • GA-P67A-UD5-B3
      • CPU:
      • Intel Core i7 2600K
      • Memory:
      • 2 x BL2KIT25664FN2139
      • Storage:
      • 4 x CTFDDAC064MAG-1G1 (Raid 0)
      • Graphics card(s):
      • ASUS Radeon R9 290 DC-2
      • PSU:
      • Corsair Professional Series Gold AX750
      • Case:
      • Lian Li PC-X500B
      • Operating System:
      • Windows 10 Pro 64-bit
      • Monitor(s):
      • 2x Samsung 22" widescreen P2270 2ms DVI HD LCD TFT Ecofit
      • Internet:
      • 40Mbps SKY Fibre

    Re: Intel processor security flaw requires OS kernel level fix

    Contrary to some reports, any performance impacts are workload-dependent, and, for the average computer user, should not be significant and will be mitigated over time.
    Which workloads, and define "average computer user". Also mitigated over time, in what manner? Software? Buying more Intel products with higher IPC?

    In light of what AMD has already stated
    AMD processors are not subject to the types of attacks that the kernel
    page table isolation feature protects against.
    , I assume Intel have asked them for advice on how to resolve the problem, seeing as AMD CPUs are not affected in the same way.

  15. #61
    Senior Member watercooled's Avatar
    Join Date
    Jan 2009
    Posts
    10,299
    Thanks
    1,449
    Thanked
    858 times in 744 posts

    Re: Intel processor security flaw requires OS kernel level fix

    I've read (no idea how true this is so please don't quote me) this may affect some non-x86 CPUs in a similar way. Intel's statement therefore doesn't necessarily contradict the ones from AMD or Linux commits.

  16. #62
    Registered+
    Join Date
    Nov 2008
    Posts
    49
    Thanks
    0
    Thanked
    2 times in 2 posts

    Re: Intel processor security flaw requires OS kernel level fix

    Intel haven't said AMD are effected but have managed to drag their name into the story to make consumers unsure

    No surprise there

  17. #63
    Member
    Join Date
    May 2009
    Location
    Where you are not
    Posts
    159
    Thanks
    10
    Thanked
    12 times in 8 posts
    • Iota's system
      • Motherboard:
      • GA-P67A-UD5-B3
      • CPU:
      • Intel Core i7 2600K
      • Memory:
      • 2 x BL2KIT25664FN2139
      • Storage:
      • 4 x CTFDDAC064MAG-1G1 (Raid 0)
      • Graphics card(s):
      • ASUS Radeon R9 290 DC-2
      • PSU:
      • Corsair Professional Series Gold AX750
      • Case:
      • Lian Li PC-X500B
      • Operating System:
      • Windows 10 Pro 64-bit
      • Monitor(s):
      • 2x Samsung 22" widescreen P2270 2ms DVI HD LCD TFT Ecofit
      • Internet:
      • 40Mbps SKY Fibre

    Re: Intel processor security flaw requires OS kernel level fix

    More information released from Google.

    https://security.googleblog.com/2018...-need.html?m=1

  18. Received thanks from:

    Corky34 (04-01-2018),peterb (04-01-2018),Xlucine (04-01-2018)

  19. #64
    Senior Member
    Join Date
    May 2014
    Posts
    996
    Thanks
    150
    Thanked
    57 times in 52 posts
    • Xlucine's system
      • Motherboard:
      • Gigabyte Z97MX Gaming 5
      • CPU:
      • i5 4690K @stock, until I upgrade my graphics
      • Memory:
      • 16GB @2133 11-11-11-27
      • Storage:
      • Crucial MX500 512GB, 2TB storage
      • Graphics card(s):
      • EVGA 980ti
      • PSU:
      • Seasonic S12G-550
      • Case:
      • Silverstone TJ08-E
      • Operating System:
      • W10
      • Monitor(s):
      • Viewsonic vx3211-2k-mhd, Dell P2414H
      • Internet:
      • Virgin 150 mb fibre

    Re: Intel processor security flaw requires OS kernel level fix

    There's a lot going on with this story
    https://www.wired.com/story/critical...ost-computers/
    On Wednesday evening, a large team of researchers at Google's Project Zero, universities including the Graz University of Technology, the University of Pennsylvania, the University of Adelaide in Australia, and security companies including Cyberus and Rambus together released the full details of two attacks based on that flaw, which they call Meltdown and Spectre.

    "These hardware bugs allow programs to steal data which [is] currently processed on the computer," reads a description of the attacks on a website the researchers created. "While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hold of secrets stored in the memory of other running programs."

    Although both attacks are based on the same general principle, Meltdown allows malicious programs to gain access to higher-privileged parts of a computer's memory, while Spectre steals data from the memory of other applications running on a machine. And while the researchers say that Meltdown is limited to Intel chips, they say that they've verified Spectre attacks on AMD and ARM processors, as well.

Page 4 of 12 FirstFirst 1234567 ... LastLast

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •