Page 4 of 12 FirstFirst 1234567 ... LastLast
Results 49 to 64 of 186

Thread: Intel processor security flaw requires OS kernel level fix

  1. #49
    Senior Member kalniel's Avatar
    Join Date
    Aug 2005
    Posts
    28,864
    Thanks
    1,440
    Thanked
    2,870 times in 2,326 posts
    • kalniel's system
      • Motherboard:
      • Gigabyte X58A UD3R rev 2
      • CPU:
      • Intel Xeon X5680
      • Memory:
      • 12gb DDR3 2000
      • Graphics card(s):
      • nVidia GTX 1060 6GB
      • PSU:
      • Seasonic 600W
      • Case:
      • Cooler Master HAF 912
      • Operating System:
      • Win 10 Pro x64
      • Monitor(s):
      • Dell U2311H
      • Internet:
      • O2 8mbps

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by Biscuit View Post
    So in actual fact, very few "core" chips are in the "you MUST upgrade" catagory, and those that are, are so old that really those people should be considering an upgrade anyway?
    Hmpf.. the 950 performs perfectly well thank you.. though maybe at -30% I could be persuaded to upgrade. X5680 here I come...

  2. #50
    IQ: 1.42
    Join Date
    May 2007
    Location
    old trafford
    Posts
    1,019
    Thanks
    123
    Thanked
    64 times in 57 posts
    • Tunnah's system
      • Motherboard:
      • Asus P8P67 PRO
      • CPU:
      • Core i7 2700K
      • Memory:
      • 12GB DDR3-1600
      • Storage:
      • Various SSDs, 90TB RAID6 HDDs
      • Graphics card(s):
      • 1080Ti
      • PSU:
      • Silverstone 650w
      • Case:
      • Lian-Li PC70B
      • Operating System:
      • Win10
      • Internet:
      • 40mbit Sky Fibre

    Re: Intel processor security flaw requires OS kernel level fix

    Really could do with an overview of the type of tasks this affects. If they're everyday tasks that don't strain the CPU then it doesn't matter (to me), however if it's going to noticeably slow down tasks that already use up all the performance of the CPU then it's a bloody big deal!

  3. #51
    Member
    Join Date
    Apr 2006
    Posts
    179
    Thanks
    0
    Thanked
    3 times in 3 posts

    Re: Intel processor security flaw requires OS kernel level fix

    "or go buy a new processor without the design blunder" such as? AMD only? Crikey
    I don't feel like giving more money to the saudis

  4. #52
    Senior Member watercooled's Avatar
    Join Date
    Jan 2009
    Posts
    10,654
    Thanks
    1,487
    Thanked
    904 times in 781 posts

    Re: Intel processor security flaw requires OS kernel level fix

    What a bizarre thing to say. AMD is a publicly traded American company - if you want to avoid giving money to a certain country at any point in the supply chain for whatever strange reason, you better avoid Intel too and go live in the woods or something. Certainly stay away from any plastics or petroleum products!

  5. Received thanks from:

    Pleiades (04-01-2018)

  6. #53
    Oh Crumbs.... Biscuit's Avatar
    Join Date
    Feb 2007
    Location
    N. Yorkshire
    Posts
    11,192
    Thanks
    1,392
    Thanked
    1,091 times in 833 posts
    • Biscuit's system
      • Motherboard:
      • MSI B450M Mortar
      • CPU:
      • AMD 2700X (Be Quiet! Dark Rock 3)
      • Memory:
      • 16GB Patriot Viper 2 @ 3466MHz
      • Storage:
      • 500GB WD Black
      • Graphics card(s):
      • Sapphire R9 290X Vapor-X
      • PSU:
      • Seasonic Focus Gold 750W
      • Case:
      • Lian Li PC-V359
      • Operating System:
      • Windows 10 x64
      • Internet:
      • BT Infinity 80/20

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by kalniel View Post
    Hmpf.. the 950 performs perfectly well thank you.. though maybe at -30% I could be persuaded to upgrade. X5680 here I come...
    I said "considering", and I'm going to go out on a limb and suggest that the thought has crossed your mind even before this announcement


    Quote Originally Posted by Iota View Post
    My 2600k is doing just fine for everything I do with my PC
    Sandybridge is post Westmere
    Last edited by Biscuit; 03-01-2018 at 08:52 PM.

  7. #54
    Senior Member watercooled's Avatar
    Join Date
    Jan 2009
    Posts
    10,654
    Thanks
    1,487
    Thanked
    904 times in 781 posts

    Re: Intel processor security flaw requires OS kernel level fix

    TBF it's probably not going to be as bad as 30%, or even 10%, in consumer workloads. The way I understand it at the moment (which is admittedly from skim-reading a couple of articles), this first round of patches is more of an emergency fix with the possibility of better-optimised workarounds coming later? A couple of demanding consumer workloads such as gaming and video encoding don't seem to be too badly affected according to Phoronix's tests, though of course they're Linux so it could be different on Windows.

    I'm very interested to see this put to the test though! And furthermore, if any future patches do improve things, it's only fair to post updated results when they're available.

  8. #55
    Senior Member
    Join Date
    Dec 2003
    Location
    Wilmslow
    Posts
    616
    Thanks
    210
    Thanked
    113 times in 81 posts
    • mtyson's system
      • Motherboard:
      • Gigabyte GA-B85M-HD3
      • CPU:
      • Intel Core i7 4790T
      • Memory:
      • 8GB
      • Storage:
      • Sandisk 128GB SSD + Seagate 750GB HDD
      • Graphics card(s):
      • Gigabyte Windforce GTX 660OC
      • PSU:
      • Corsair 400W
      • Case:
      • Zalman Z9 Plus
      • Operating System:
      • Windows 10
      • Monitor(s):
      • Acer IPS 24-inch 1080p
      • Internet:
      • 50MB Virgin fibre

    Re: Intel processor security flaw requires OS kernel level fix

    Story has been updated with an official response from Intel:

    Intel has officially responded to the security flaw reports in an email to HEXUS and via its official Newsroom Blog. In a nutshell it has issued a denial of sorts, saying that any exploits via flaws are not unique to Intel products. It then mentions how it is working closely with the likes of AMD, ARM Holdings and several operating system vendors to solve the issues discussed in the news above. Below is an excerpt of the statement for your convenience, or you can digest the full Intel blog post at the link above.

    "Intel and other technology companies have been made aware of new security research describing software analysis methods that, when used for malicious purposes, have the potential to improperly gather sensitive data from computing devices that are operating as designed. Intel believes these exploits do not have the potential to corrupt, modify or delete data.

    Recent reports that these exploits are caused by a “bug” or a “flaw” and are unique to Intel products are incorrect. Based on the analysis to date, many types of computing devices — with many different vendors’ processors and operating systems — are susceptible to these exploits.

    Snip

    Intel believes its products are the most secure in the world and that, with the support of its partners, the current solutions to this issue provide the best possible security for its customers."
    Last edited by mtyson; 03-01-2018 at 09:43 PM. Reason: indents

  9. Received thanks from:

    peterb (03-01-2018),The Hand (03-01-2018)

  10. #56
    Admin team peterb's Avatar
    Join Date
    Aug 2005
    Location
    Southampton
    Posts
    18,748
    Thanks
    2,624
    Thanked
    3,189 times in 2,532 posts
    • peterb's system
      • Motherboard:
      • Nascom 2
      • CPU:
      • Z80B
      • Memory:
      • 48K 8 bit memory on separate card
      • Storage:
      • Audio cassette tape - home built 5.25" floppy drive
      • Graphics card(s):
      • text output (composite video)
      • PSU:
      • Home built
      • Case:
      • Home built
      • Operating System:
      • Nas-sys
      • Monitor(s):
      • 12" monocrome composite video input
      • Internet:
      • No networking capability on this machine

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by mtyson View Post
    Story has been updated with an official response from Intel:

    Intel has officially responded to the security flaw reports in an email to HEXUS and via its official Newsroom Blog. In a nutshell it has issued a denial of sorts, saying that any exploits via flaws are not unique to Intel products. It then mentions how it is working closely with the likes of AMD, ARM Holdings and several operating system vendors to solve the issues discussed in the news above. Below is an excerpt of the statement for your convenience, or you can digest the full Intel blog post at the link above.

    <snip>
    The cynic in me wonders if this is a damage limitation exercise given the volatility in the Intel share price.

    On the other hand, there has been a lot of speculation about the effects of the patch and the risks of the ‘exploit’ and lets face it, bad news is good news for some media outlets - nothing like a bit of sensationalism to generate readers.

    So it will be interesting to see what the real world effects are wh3n the patches are released - presumably next week.
    (\__/)
    (='.'=)
    (")_(")

    Been helped or just 'Like' a post? Use the Thanks button!
    My broadband speed - 750 Meganibbles/minute

  11. #57
    Senior Member
    Join Date
    Feb 2009
    Location
    Castle Gresley
    Posts
    628
    Thanks
    28
    Thanked
    18 times in 18 posts
    • marshalex's system
      • Motherboard:
      • Asus P6T bios 1303
      • CPU:
      • Intel Core i7 920 @ 3.8Ghz
      • Memory:
      • 12GB Kingston Hyper X DDR3 1600MHz
      • Storage:
      • Samsung 840, WD Caviar Black 640Gb, WD Caviar Blue 1TB
      • Graphics card(s):
      • XFX Radeon HD 6950 XXX @915 MHz
      • PSU:
      • Antec TruePower New 650W
      • Case:
      • Coolermaster CM690
      • Operating System:
      • Windows 7 Professional x64
      • Monitor(s):
      • Dell ST2210
      • Internet:
      • Sky Fibre 38MB

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by mtyson View Post
    Story has been updated with an official response from Intel:

    Intel has officially responded to the security flaw reports in an email to HEXUS and via its official Newsroom Blog. In a nutshell it has issued a denial of sorts, saying that any exploits via flaws are not unique to Intel products. It then mentions how it is working closely with the likes of AMD, ARM Holdings and several operating system vendors to solve the issues discussed in the news above. Below is an excerpt of the statement for your convenience, or you can digest the full Intel blog post at the link above.

    "Intel and other technology companies have been made aware of new security research describing software analysis methods that, when used for malicious purposes, have the potential to improperly gather sensitive data from computing devices that are operating as designed. Intel believes these exploits do not have the potential to corrupt, modify or delete data.

    Recent reports that these exploits are caused by a “bug” or a “flaw” and are unique to Intel products are incorrect. Based on the analysis to date, many types of computing devices — with many different vendors’ processors and operating systems — are susceptible to these exploits.

    Snip

    Intel believes its products are the most secure in the world and that, with the support of its partners, the current solutions to this issue provide the best possible security for its customers."
    Didn’t AMD come out when this story broke and state it didn’t affect their products?

  12. #58
    Kaplah! OilSheikh's Avatar
    Join Date
    Jun 2007
    Location
    Londinium
    Posts
    5,284
    Thanks
    1,488
    Thanked
    284 times in 230 posts
    • OilSheikh's system
      • Motherboard:
      • ASUS P8P67
      • CPU:
      • i7 2600 w Xigmatek Thor's Hammer+ Noctua 14cm silent fan
      • Memory:
      • 4GB Crucial Ballistix Elite Tracer+ 4GB HyperX DDR3
      • Storage:
      • Samsung 860 Evo 500GB SSD + 1TB SAMSUNG F3
      • Graphics card(s):
      • MSI Rx 580 8GB
      • PSU:
      • Seasonic 600W
      • Case:
      • ZALMAN Z9 PLUS
      • Operating System:
      • Windows 7 Pro
      • Monitor(s):
      • 22" LG IPS LED
      • Internet:
      • 80Mbps Plusnet

    Re: Intel processor security flaw requires OS kernel level fix

    How come it took them so many years to find this flaw ?

  13. #59
    Admin team peterb's Avatar
    Join Date
    Aug 2005
    Location
    Southampton
    Posts
    18,748
    Thanks
    2,624
    Thanked
    3,189 times in 2,532 posts
    • peterb's system
      • Motherboard:
      • Nascom 2
      • CPU:
      • Z80B
      • Memory:
      • 48K 8 bit memory on separate card
      • Storage:
      • Audio cassette tape - home built 5.25" floppy drive
      • Graphics card(s):
      • text output (composite video)
      • PSU:
      • Home built
      • Case:
      • Home built
      • Operating System:
      • Nas-sys
      • Monitor(s):
      • 12" monocrome composite video input
      • Internet:
      • No networking capability on this machine

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by OilSheikh View Post
    How come it took them so many years to find this flaw ?
    Probably because no-one was looking for it. I guess it was stumbled on by chance. There has been a lot of work recently in reverse engineering the Intel Management Engine and this could have come to light during that work (even though the two seem to be otherwise unrelated)

    Lots of bugs have been around a long time. The shell shock bug was around for 30 years without causing problems, and was only discovered when other software advances started using that particular shell command in novel ways.
    (\__/)
    (='.'=)
    (")_(")

    Been helped or just 'Like' a post? Use the Thanks button!
    My broadband speed - 750 Meganibbles/minute

  14. #60
    Senior Member
    Join Date
    May 2009
    Location
    Where you are not
    Posts
    463
    Thanks
    164
    Thanked
    37 times in 30 posts
    • Iota's system
      • Motherboard:
      • GA-P67A-UD5-B3
      • CPU:
      • Intel Core i7 2600K
      • Memory:
      • 2 x BL2KIT25664FN2139
      • Storage:
      • 4 x CTFDDAC064MAG-1G1 (Raid 0)
      • Graphics card(s):
      • ASUS Radeon R9 290 DC-2
      • PSU:
      • Corsair Professional Series Gold AX750
      • Case:
      • Lian Li PC-X500B
      • Operating System:
      • Windows 10 Pro 64-bit
      • Monitor(s):
      • 2x Samsung 22" widescreen P2270 2ms DVI HD LCD TFT Ecofit
      • Internet:
      • 40Mbps SKY Fibre

    Re: Intel processor security flaw requires OS kernel level fix

    Contrary to some reports, any performance impacts are workload-dependent, and, for the average computer user, should not be significant and will be mitigated over time.
    Which workloads, and define "average computer user". Also mitigated over time, in what manner? Software? Buying more Intel products with higher IPC?

    In light of what AMD has already stated
    AMD processors are not subject to the types of attacks that the kernel
    page table isolation feature protects against.
    , I assume Intel have asked them for advice on how to resolve the problem, seeing as AMD CPUs are not affected in the same way.

  15. #61
    Senior Member watercooled's Avatar
    Join Date
    Jan 2009
    Posts
    10,654
    Thanks
    1,487
    Thanked
    904 times in 781 posts

    Re: Intel processor security flaw requires OS kernel level fix

    I've read (no idea how true this is so please don't quote me) this may affect some non-x86 CPUs in a similar way. Intel's statement therefore doesn't necessarily contradict the ones from AMD or Linux commits.

  16. #62
    Registered+
    Join Date
    Nov 2008
    Posts
    50
    Thanks
    1
    Thanked
    2 times in 2 posts

    Re: Intel processor security flaw requires OS kernel level fix

    Intel haven't said AMD are effected but have managed to drag their name into the story to make consumers unsure

    No surprise there

  17. #63
    Senior Member
    Join Date
    May 2009
    Location
    Where you are not
    Posts
    463
    Thanks
    164
    Thanked
    37 times in 30 posts
    • Iota's system
      • Motherboard:
      • GA-P67A-UD5-B3
      • CPU:
      • Intel Core i7 2600K
      • Memory:
      • 2 x BL2KIT25664FN2139
      • Storage:
      • 4 x CTFDDAC064MAG-1G1 (Raid 0)
      • Graphics card(s):
      • ASUS Radeon R9 290 DC-2
      • PSU:
      • Corsair Professional Series Gold AX750
      • Case:
      • Lian Li PC-X500B
      • Operating System:
      • Windows 10 Pro 64-bit
      • Monitor(s):
      • 2x Samsung 22" widescreen P2270 2ms DVI HD LCD TFT Ecofit
      • Internet:
      • 40Mbps SKY Fibre

    Re: Intel processor security flaw requires OS kernel level fix

    More information released from Google.

    https://security.googleblog.com/2018...-need.html?m=1

  18. Received thanks from:

    Corky34 (04-01-2018),peterb (04-01-2018),Xlucine (04-01-2018)

  19. #64
    Senior Member Xlucine's Avatar
    Join Date
    May 2014
    Posts
    1,360
    Thanks
    203
    Thanked
    100 times in 85 posts
    • Xlucine's system
      • Motherboard:
      • Gigabyte Z97MX Gaming 5
      • CPU:
      • i5 4690K @stock
      • Memory:
      • 16GB @2133 11-11-11-27
      • Storage:
      • Crucial MX500 1TB, Crucial MX100 512GB, 2TB hard disk
      • Graphics card(s):
      • EVGA 980ti
      • PSU:
      • Seasonic S12G-550
      • Case:
      • Silverstone TJ08-E
      • Operating System:
      • W10 pro
      • Monitor(s):
      • Viewsonic vx3211-2k-mhd, Dell P2414H
      • Internet:
      • Virgin 150 mb fibre

    Re: Intel processor security flaw requires OS kernel level fix

    There's a lot going on with this story
    https://www.wired.com/story/critical...ost-computers/
    On Wednesday evening, a large team of researchers at Google's Project Zero, universities including the Graz University of Technology, the University of Pennsylvania, the University of Adelaide in Australia, and security companies including Cyberus and Rambus together released the full details of two attacks based on that flaw, which they call Meltdown and Spectre.

    "These hardware bugs allow programs to steal data which [is] currently processed on the computer," reads a description of the attacks on a website the researchers created. "While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hold of secrets stored in the memory of other running programs."

    Although both attacks are based on the same general principle, Meltdown allows malicious programs to gain access to higher-privileged parts of a computer's memory, while Spectre steals data from the memory of other applications running on a machine. And while the researchers say that Meltdown is limited to Intel chips, they say that they've verified Spectre attacks on AMD and ARM processors, as well.

Page 4 of 12 FirstFirst 1234567 ... LastLast

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •