Page 4 of 12 FirstFirst 1234567 ... LastLast
Results 49 to 64 of 186

Thread: Intel processor security flaw requires OS kernel level fix

  1. #49
    Banhammer in peace PeterB kalniel's Avatar
    Join Date
    Aug 2005
    Posts
    31,025
    Thanks
    1,871
    Thanked
    3,383 times in 2,720 posts
    • kalniel's system
      • Motherboard:
      • Gigabyte Z390 Aorus Ultra
      • CPU:
      • Intel i9 9900k
      • Memory:
      • 32GB DDR4 3200 CL16
      • Storage:
      • 1TB Samsung 970Evo+ NVMe
      • Graphics card(s):
      • nVidia GTX 1060 6GB
      • PSU:
      • Seasonic 600W
      • Case:
      • Cooler Master HAF 912
      • Operating System:
      • Win 10 Pro x64
      • Monitor(s):
      • Dell S2721DGF
      • Internet:
      • rubbish

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by Biscuit View Post
    So in actual fact, very few "core" chips are in the "you MUST upgrade" catagory, and those that are, are so old that really those people should be considering an upgrade anyway?
    Hmpf.. the 950 performs perfectly well thank you.. though maybe at -30% I could be persuaded to upgrade. X5680 here I come...

  2. #50
    IQ: 1.42
    Join Date
    May 2007
    Location
    old trafford
    Posts
    1,340
    Thanks
    132
    Thanked
    94 times in 80 posts
    • Tunnah's system
      • Motherboard:
      • Asus somethingorother
      • CPU:
      • 3700X
      • Memory:
      • 16GB 3600
      • Storage:
      • Various SSDs, 90TB RAID6 HDDs
      • Graphics card(s):
      • 1080Ti
      • PSU:
      • Silverstone 650w
      • Case:
      • Lian-Li PC70B
      • Operating System:
      • Win10
      • Internet:
      • 40mbit Sky Fibre

    Re: Intel processor security flaw requires OS kernel level fix

    Really could do with an overview of the type of tasks this affects. If they're everyday tasks that don't strain the CPU then it doesn't matter (to me), however if it's going to noticeably slow down tasks that already use up all the performance of the CPU then it's a bloody big deal!

  3. #51
    ETR316
    Guest

    Re: Intel processor security flaw requires OS kernel level fix

    "or go buy a new processor without the design blunder" such as? AMD only? Crikey
    I don't feel like giving more money to the saudis

  4. #52
    Senior Member watercooled's Avatar
    Join Date
    Jan 2009
    Posts
    11,478
    Thanks
    1,541
    Thanked
    1,029 times in 872 posts

    Re: Intel processor security flaw requires OS kernel level fix

    What a bizarre thing to say. AMD is a publicly traded American company - if you want to avoid giving money to a certain country at any point in the supply chain for whatever strange reason, you better avoid Intel too and go live in the woods or something. Certainly stay away from any plastics or petroleum products!

  5. Received thanks from:

    Pleiades (04-01-2018)

  6. #53
    Oh Crumbs.... Biscuit's Avatar
    Join Date
    Feb 2007
    Location
    N. Yorkshire
    Posts
    11,193
    Thanks
    1,394
    Thanked
    1,091 times in 833 posts
    • Biscuit's system
      • Motherboard:
      • MSI B450M Mortar
      • CPU:
      • AMD 2700X (Be Quiet! Dark Rock 3)
      • Memory:
      • 16GB Patriot Viper 2 @ 3466MHz
      • Storage:
      • 500GB WD Black
      • Graphics card(s):
      • Sapphire R9 290X Vapor-X
      • PSU:
      • Seasonic Focus Gold 750W
      • Case:
      • Lian Li PC-V359
      • Operating System:
      • Windows 10 x64
      • Internet:
      • BT Infinity 80/20

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by kalniel View Post
    Hmpf.. the 950 performs perfectly well thank you.. though maybe at -30% I could be persuaded to upgrade. X5680 here I come...
    I said "considering", and I'm going to go out on a limb and suggest that the thought has crossed your mind even before this announcement


    Quote Originally Posted by Iota View Post
    My 2600k is doing just fine for everything I do with my PC
    Sandybridge is post Westmere
    Last edited by Biscuit; 03-01-2018 at 08:52 PM.

  7. #54
    Senior Member watercooled's Avatar
    Join Date
    Jan 2009
    Posts
    11,478
    Thanks
    1,541
    Thanked
    1,029 times in 872 posts

    Re: Intel processor security flaw requires OS kernel level fix

    TBF it's probably not going to be as bad as 30%, or even 10%, in consumer workloads. The way I understand it at the moment (which is admittedly from skim-reading a couple of articles), this first round of patches is more of an emergency fix with the possibility of better-optimised workarounds coming later? A couple of demanding consumer workloads such as gaming and video encoding don't seem to be too badly affected according to Phoronix's tests, though of course they're Linux so it could be different on Windows.

    I'm very interested to see this put to the test though! And furthermore, if any future patches do improve things, it's only fair to post updated results when they're available.

  8. #55
    Senior Member
    Join Date
    Dec 2003
    Location
    Taichung City
    Posts
    898
    Thanks
    281
    Thanked
    172 times in 121 posts
    • mtyson's system
      • Motherboard:
      • Gigabyte GA-B85M-HD3
      • CPU:
      • Intel Core i7 4790T
      • Memory:
      • 12GB
      • Storage:
      • Sandisk 128GB SSD + Kingston 500GB SSD + NAS etc
      • Graphics card(s):
      • Sapphire Radeon RX 580 Nitro+
      • PSU:
      • Corsair 430W
      • Case:
      • Zalman Z9 Plus
      • Operating System:
      • Windows 10
      • Monitor(s):
      • AOC 31.5-inch VA QHD monitor
      • Internet:
      • 100MB Virgin fibre

    Re: Intel processor security flaw requires OS kernel level fix

    Story has been updated with an official response from Intel:

    Intel has officially responded to the security flaw reports in an email to HEXUS and via its official Newsroom Blog. In a nutshell it has issued a denial of sorts, saying that any exploits via flaws are not unique to Intel products. It then mentions how it is working closely with the likes of AMD, ARM Holdings and several operating system vendors to solve the issues discussed in the news above. Below is an excerpt of the statement for your convenience, or you can digest the full Intel blog post at the link above.

    "Intel and other technology companies have been made aware of new security research describing software analysis methods that, when used for malicious purposes, have the potential to improperly gather sensitive data from computing devices that are operating as designed. Intel believes these exploits do not have the potential to corrupt, modify or delete data.

    Recent reports that these exploits are caused by a “bug” or a “flaw” and are unique to Intel products are incorrect. Based on the analysis to date, many types of computing devices — with many different vendors’ processors and operating systems — are susceptible to these exploits.

    Snip

    Intel believes its products are the most secure in the world and that, with the support of its partners, the current solutions to this issue provide the best possible security for its customers."
    Last edited by mtyson; 03-01-2018 at 09:43 PM. Reason: indents

  9. Received thanks from:

    peterb (03-01-2018),The Hand (03-01-2018)

  10. #56
    The late but legendary peterb - Onward and Upward peterb's Avatar
    Join Date
    Aug 2005
    Location
    Looking down & checking on swearing
    Posts
    19,378
    Thanks
    2,892
    Thanked
    3,403 times in 2,693 posts

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by mtyson View Post
    Story has been updated with an official response from Intel:

    Intel has officially responded to the security flaw reports in an email to HEXUS and via its official Newsroom Blog. In a nutshell it has issued a denial of sorts, saying that any exploits via flaws are not unique to Intel products. It then mentions how it is working closely with the likes of AMD, ARM Holdings and several operating system vendors to solve the issues discussed in the news above. Below is an excerpt of the statement for your convenience, or you can digest the full Intel blog post at the link above.

    <snip>
    The cynic in me wonders if this is a damage limitation exercise given the volatility in the Intel share price.

    On the other hand, there has been a lot of speculation about the effects of the patch and the risks of the ‘exploit’ and lets face it, bad news is good news for some media outlets - nothing like a bit of sensationalism to generate readers.

    So it will be interesting to see what the real world effects are wh3n the patches are released - presumably next week.
    (\__/)
    (='.'=)
    (")_(")

    Been helped or just 'Like' a post? Use the Thanks button!
    My broadband speed - 750 Meganibbles/minute

  11. #57
    Senior Member
    Join Date
    Feb 2009
    Location
    Castle Gresley
    Posts
    628
    Thanks
    28
    Thanked
    18 times in 18 posts
    • marshalex's system
      • Motherboard:
      • Asus P6T bios 1303
      • CPU:
      • Intel Core i7 920 @ 3.8Ghz
      • Memory:
      • 12GB Kingston Hyper X DDR3 1600MHz
      • Storage:
      • Samsung 840, WD Caviar Black 640Gb, WD Caviar Blue 1TB
      • Graphics card(s):
      • XFX Radeon HD 6950 XXX @915 MHz
      • PSU:
      • Antec TruePower New 650W
      • Case:
      • Coolermaster CM690
      • Operating System:
      • Windows 7 Professional x64
      • Monitor(s):
      • Dell ST2210
      • Internet:
      • Sky Fibre 38MB

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by mtyson View Post
    Story has been updated with an official response from Intel:

    Intel has officially responded to the security flaw reports in an email to HEXUS and via its official Newsroom Blog. In a nutshell it has issued a denial of sorts, saying that any exploits via flaws are not unique to Intel products. It then mentions how it is working closely with the likes of AMD, ARM Holdings and several operating system vendors to solve the issues discussed in the news above. Below is an excerpt of the statement for your convenience, or you can digest the full Intel blog post at the link above.

    "Intel and other technology companies have been made aware of new security research describing software analysis methods that, when used for malicious purposes, have the potential to improperly gather sensitive data from computing devices that are operating as designed. Intel believes these exploits do not have the potential to corrupt, modify or delete data.

    Recent reports that these exploits are caused by a “bug” or a “flaw” and are unique to Intel products are incorrect. Based on the analysis to date, many types of computing devices — with many different vendors’ processors and operating systems — are susceptible to these exploits.

    Snip

    Intel believes its products are the most secure in the world and that, with the support of its partners, the current solutions to this issue provide the best possible security for its customers."
    Didn’t AMD come out when this story broke and state it didn’t affect their products?

  12. #58
    OilSheikh
    Guest

    Re: Intel processor security flaw requires OS kernel level fix

    How come it took them so many years to find this flaw ?

  13. #59
    The late but legendary peterb - Onward and Upward peterb's Avatar
    Join Date
    Aug 2005
    Location
    Looking down & checking on swearing
    Posts
    19,378
    Thanks
    2,892
    Thanked
    3,403 times in 2,693 posts

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by OilSheikh View Post
    How come it took them so many years to find this flaw ?
    Probably because no-one was looking for it. I guess it was stumbled on by chance. There has been a lot of work recently in reverse engineering the Intel Management Engine and this could have come to light during that work (even though the two seem to be otherwise unrelated)

    Lots of bugs have been around a long time. The shell shock bug was around for 30 years without causing problems, and was only discovered when other software advances started using that particular shell command in novel ways.
    (\__/)
    (='.'=)
    (")_(")

    Been helped or just 'Like' a post? Use the Thanks button!
    My broadband speed - 750 Meganibbles/minute

  14. #60
    Senior Member
    Join Date
    May 2009
    Location
    Where you are not
    Posts
    1,330
    Thanks
    608
    Thanked
    103 times in 90 posts
    • Iota's system
      • Motherboard:
      • Asus Maximus Hero XI
      • CPU:
      • Intel Core i9 9900KF
      • Memory:
      • CMD32GX4M2C3200C16
      • Storage:
      • 1 x 1TB / 3 x 2TB Samsung 970 Evo Plus NVMe
      • Graphics card(s):
      • Nvidia RTX 3090 Founders Edition
      • PSU:
      • Corsair HX1200i
      • Case:
      • Corsair Obsidian 500D
      • Operating System:
      • Windows 10 Pro 64-bit
      • Monitor(s):
      • Samsung Odyssey G9
      • Internet:
      • 500Mbps BT FTTH

    Re: Intel processor security flaw requires OS kernel level fix

    Contrary to some reports, any performance impacts are workload-dependent, and, for the average computer user, should not be significant and will be mitigated over time.
    Which workloads, and define "average computer user". Also mitigated over time, in what manner? Software? Buying more Intel products with higher IPC?

    In light of what AMD has already stated
    AMD processors are not subject to the types of attacks that the kernel
    page table isolation feature protects against.
    , I assume Intel have asked them for advice on how to resolve the problem, seeing as AMD CPUs are not affected in the same way.

  15. #61
    Senior Member watercooled's Avatar
    Join Date
    Jan 2009
    Posts
    11,478
    Thanks
    1,541
    Thanked
    1,029 times in 872 posts

    Re: Intel processor security flaw requires OS kernel level fix

    I've read (no idea how true this is so please don't quote me) this may affect some non-x86 CPUs in a similar way. Intel's statement therefore doesn't necessarily contradict the ones from AMD or Linux commits.

  16. #62
    Registered+
    Join Date
    Nov 2008
    Posts
    56
    Thanks
    1
    Thanked
    6 times in 4 posts

    Re: Intel processor security flaw requires OS kernel level fix

    Intel haven't said AMD are effected but have managed to drag their name into the story to make consumers unsure

    No surprise there

  17. #63
    Senior Member
    Join Date
    May 2009
    Location
    Where you are not
    Posts
    1,330
    Thanks
    608
    Thanked
    103 times in 90 posts
    • Iota's system
      • Motherboard:
      • Asus Maximus Hero XI
      • CPU:
      • Intel Core i9 9900KF
      • Memory:
      • CMD32GX4M2C3200C16
      • Storage:
      • 1 x 1TB / 3 x 2TB Samsung 970 Evo Plus NVMe
      • Graphics card(s):
      • Nvidia RTX 3090 Founders Edition
      • PSU:
      • Corsair HX1200i
      • Case:
      • Corsair Obsidian 500D
      • Operating System:
      • Windows 10 Pro 64-bit
      • Monitor(s):
      • Samsung Odyssey G9
      • Internet:
      • 500Mbps BT FTTH

    Re: Intel processor security flaw requires OS kernel level fix

    More information released from Google.

    https://security.googleblog.com/2018...-need.html?m=1

  18. Received thanks from:

    Corky34 (04-01-2018),peterb (04-01-2018),Xlucine (04-01-2018)

  19. #64
    Senior Member Xlucine's Avatar
    Join Date
    May 2014
    Posts
    2,160
    Thanks
    297
    Thanked
    188 times in 147 posts
    • Xlucine's system
      • Motherboard:
      • Asus TUF B450M-plus
      • CPU:
      • 3700X
      • Memory:
      • 16GB @ 3.2 Gt/s
      • Storage:
      • Crucial P5 1TB (boot), Crucial MX500 1TB, Crucial MX100 512GB
      • Graphics card(s):
      • EVGA 980ti
      • PSU:
      • Fractal Design ION+ 560P
      • Case:
      • Silverstone TJ08-E
      • Operating System:
      • W10 pro
      • Monitor(s):
      • Viewsonic vx3211-2k-mhd, Dell P2414H

    Re: Intel processor security flaw requires OS kernel level fix

    There's a lot going on with this story
    https://www.wired.com/story/critical...ost-computers/
    On Wednesday evening, a large team of researchers at Google's Project Zero, universities including the Graz University of Technology, the University of Pennsylvania, the University of Adelaide in Australia, and security companies including Cyberus and Rambus together released the full details of two attacks based on that flaw, which they call Meltdown and Spectre.

    "These hardware bugs allow programs to steal data which [is] currently processed on the computer," reads a description of the attacks on a website the researchers created. "While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hold of secrets stored in the memory of other running programs."

    Although both attacks are based on the same general principle, Meltdown allows malicious programs to gain access to higher-privileged parts of a computer's memory, while Spectre steals data from the memory of other applications running on a machine. And while the researchers say that Meltdown is limited to Intel chips, they say that they've verified Spectre attacks on AMD and ARM processors, as well.

Page 4 of 12 FirstFirst 1234567 ... LastLast

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •