Page 7 of 12 FirstFirst ... 45678910 ... LastLast
Results 97 to 112 of 186

Thread: Intel processor security flaw requires OS kernel level fix

  1. #97
    Evil Monkey! MrJim's Avatar
    Join Date
    Aug 2012
    Location
    London
    Posts
    2,328
    Thanks
    315
    Thanked
    463 times in 357 posts
    • MrJim's system
      • Motherboard:
      • MSI Tomahawk X570
      • CPU:
      • AMD Ryzen 5900X
      • Memory:
      • 32gb Kingston 3600 DDR4
      • Storage:
      • Aorus 1Tb NVME SSD, Samsung 1Tb 970 Evo SSD, Crucial 2tb MX500 SSD, Seagate Ironwolf 4Tb SSD
      • Graphics card(s):
      • EVGA 3080Ti
      • PSU:
      • Seasonic Prime Ultra Platinum 1300W
      • Case:
      • Fractal Meshify 2
      • Operating System:
      • Windows 11 Pro
      • Monitor(s):
      • Viewsonic 27" XG2703-GS
      • Internet:
      • BT 900 mb/s FTTP

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by DanceswithUnix View Post
    No drop in games performance then, nice.
    Not on the 8700k, at least. I guess it's possible other Intel CPUs may be more seriously affected...

  2. #98
    Oh Crumbs.... Biscuit's Avatar
    Join Date
    Feb 2007
    Location
    N. Yorkshire
    Posts
    11,193
    Thanks
    1,394
    Thanked
    1,091 times in 833 posts
    • Biscuit's system
      • Motherboard:
      • MSI B450M Mortar
      • CPU:
      • AMD 2700X (Be Quiet! Dark Rock 3)
      • Memory:
      • 16GB Patriot Viper 2 @ 3466MHz
      • Storage:
      • 500GB WD Black
      • Graphics card(s):
      • Sapphire R9 290X Vapor-X
      • PSU:
      • Seasonic Focus Gold 750W
      • Case:
      • Lian Li PC-V359
      • Operating System:
      • Windows 10 x64
      • Internet:
      • BT Infinity 80/20

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by MrJim View Post
    Not on the 8700k, at least. I guess it's possible other Intel CPUs may be more seriously affected...
    Thats what I was thinking. Be interesting to see how Core2 and Gen1-Gen3 Core i chips have been affected

  3. #99
    Senior Member Lanky123's Avatar
    Join Date
    Jul 2007
    Location
    Oxford
    Posts
    922
    Thanks
    91
    Thanked
    152 times in 101 posts
    • Lanky123's system
      • Motherboard:
      • Gigabyte GA-H81M-D2V
      • CPU:
      • Core i5 4570
      • Memory:
      • 2 x 4GB Vengeance LP
      • Storage:
      • 250GB Samsung 840 EVO SSD + 2+4TB HDD + 3TB Synology DS216SE
      • Graphics card(s):
      • MSI Radeon R9 270X HAWK
      • PSU:
      • Silverstone Strider 400W
      • Case:
      • Silverstone Sugo SG02B-F
      • Operating System:
      • Windows 8.1 / Ubuntu 16.04
      • Monitor(s):
      • ElectriQ 32" 4k IPS + Dell 22" U2212HM
      • Internet:
      • Virgin 60Mbit/s

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by DanceswithUnix View Post
    Turn around on silicon is slow. Months to prove a fix, then 3 months for production silicon at the new mask rev level to turn up in the market place.
    This got me thinking - anyone have a reasonable guess as to how easy this will be to fix in new processors? New stepping, new model or entirely new architecture to sort it out? Mainly wondering how the Intel roadmap is likely to be affected - can they afford to release their next batch of CPUs (Cannonlake?) with the problem still there on the basis that OS updates have kind of, sort of fixed it anyway?

  4. #100
    Senior Member
    Join Date
    May 2014
    Posts
    2,385
    Thanks
    181
    Thanked
    304 times in 221 posts

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by Lanky123 View Post
    This got me thinking - anyone have a reasonable guess as to how easy this will be to fix in new processors? New stepping, new model or entirely new architecture to sort it out? Mainly wondering how the Intel roadmap is likely to be affected - can they afford to release their next batch of CPUs (Cannonlake?) with the problem still there on the basis that OS updates have kind of, sort of fixed it anyway?
    I would suspect because they're already in their final stages, Intel will continue with their deployment because in actuality these issues don't affect the commercial market too much anyway. However, on the Server and Corporate side of things, I expect a large lashback against Intel and Intel may have to actually hold back their server arm to fix these flaws. No company wants to buy a processor with a potential 30% speed dump in their applications or run a security risk.

  5. Received thanks from:

    Lanky123 (04-01-2018)

  6. #101
    Now 100% Apple free cheesemp's Avatar
    Join Date
    Apr 2007
    Location
    Near the New forest
    Posts
    2,948
    Thanks
    354
    Thanked
    255 times in 173 posts
    • cheesemp's system
      • Motherboard:
      • ASUS TUF x570-plus
      • CPU:
      • Ryzen 3600
      • Memory:
      • 16gb Corsair RGB ram
      • Storage:
      • 256Gb NVMe + 500Gb TcSunbow SDD (cheap for games only)
      • Graphics card(s):
      • RX 480 8Gb Nitro+ OC (with auto OC to above 580 speeds!)
      • PSU:
      • Cooler Master MWE 750 bronze
      • Case:
      • Gamemax f15m
      • Operating System:
      • Win 11
      • Monitor(s):
      • 32" QHD AOC Q3279VWF
      • Internet:
      • FTTC ~35Mb

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by Lanky123 View Post
    This got me thinking - anyone have a reasonable guess as to how easy this will be to fix in new processors? New stepping, new model or entirely new architecture to sort it out? Mainly wondering how the Intel roadmap is likely to be affected - can they afford to release their next batch of CPUs (Cannonlake?) with the problem still there on the basis that OS updates have kind of, sort of fixed it anyway?
    From my very limited understanding of Meltdown (the intel only issue) it should be fixable using some improvements to the speculative execution architecture. Not a minor change at a guess but not a complete rewrite (based as I say on my limited understanding although I do have a degree in computer engineering so not completely armchair - just slightly as I've become software focused since my degree). As for the more general 'Spectre' issue I'm not as sure. Its been implied Spectre can be mitigated by software design however that then leaves you at the mercy of devs...
    Trust

    Laptop : Dell Inspiron 1545 with Ryzen 5500u, 16gb and 256 NVMe, Windows 11.

  7. Received thanks from:

    Lanky123 (04-01-2018)

  8. #102
    root Member DanceswithUnix's Avatar
    Join Date
    Jan 2006
    Location
    In the middle of a core dump
    Posts
    13,009
    Thanks
    781
    Thanked
    1,568 times in 1,325 posts
    • DanceswithUnix's system
      • Motherboard:
      • Asus X470-PRO
      • CPU:
      • 5900X
      • Memory:
      • 32GB 3200MHz ECC
      • Storage:
      • 2TB Linux, 2TB Games (Win 10)
      • Graphics card(s):
      • Asus Strix RX Vega 56
      • PSU:
      • 650W Corsair TX
      • Case:
      • Antec 300
      • Operating System:
      • Fedora 39 + Win 10 Pro 64 (yuk)
      • Monitor(s):
      • Benq XL2730Z 1440p + Iiyama 27" 1440p
      • Internet:
      • Zen 900Mb/900Mb (CityFibre FttP)

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by Lanky123 View Post
    This got me thinking - anyone have a reasonable guess as to how easy this will be to fix in new processors? New stepping, new model or entirely new architecture to sort it out? Mainly wondering how the Intel roadmap is likely to be affected - can they afford to release their next batch of CPUs (Cannonlake?) with the problem still there on the basis that OS updates have kind of, sort of fixed it anyway?
    This stuff is deep into the execution pipelines. Clearly Meltdown can be fixed because AMD don't have the problem, but I can't see it being easy and could harm performance as the problem here seems to be how aggressively Intel are speculatively executing instructions vs how aggressively they are checking the permissions. Spectre sounds nastier, but I'm sure defences will be constructed.

    It strikes me that execution has to switch from top address bit not set to top bit set (at least in AMD64 which is all people really care about these days and architecturally implements a split instruction space for OS vs applications) and detecting a single bit flip to tread carefully might lower the pain. But who knows other than Intel, I have never seen the code for their pipelines.

  9. Received thanks from:

    Lanky123 (04-01-2018)

  10. #103
    Not a good person scaryjim's Avatar
    Join Date
    Jan 2009
    Location
    Gateshead
    Posts
    15,196
    Thanks
    1,232
    Thanked
    2,290 times in 1,873 posts
    • scaryjim's system
      • Motherboard:
      • Dell Inspiron
      • CPU:
      • Core i5 8250U
      • Memory:
      • 2x 4GB DDR4 2666
      • Storage:
      • 128GB M.2 SSD + 1TB HDD
      • Graphics card(s):
      • Radeon R5 230
      • PSU:
      • Battery/Dell brick
      • Case:
      • Dell Inspiron 5570
      • Operating System:
      • Windows 10
      • Monitor(s):
      • 15" 1080p laptop panel

    Re: Intel processor security flaw requires OS kernel level fix

    Just been tacked onto another complication with Windows patches via twitter:

    https://support.microsoft.com/en-us/...dates-released

    Microsoft has identified a compatibility issue with a small number of anti-virus software products.

    The compatibility issue is caused when anti-virus applications make unsupported calls into Windows kernel memory. These calls may cause stop errors (also known as blue screen errors) that make the device unable to boot. To help prevent stop errors caused by incompatible anti-virus applications, Microsoft is only offering the Windows security updates released on January 3, 2018 to devices running anti-virus software from partners who have confirmed their software is compatible with the January 2018 Windows operating system security update.
    Yep, your anti-virus may be making unsupported calls to kernel memory that will make your device unbootable if you apply a patch to fix a security vulnerability affecting kernel memory....

  11. Received thanks from:

    CAT-THE-FIFTH (04-01-2018),Iota (04-01-2018),mtyson (04-01-2018)

  12. #104
    Two Places At Once Ozaron's Avatar
    Join Date
    Jan 2017
    Location
    Sometimes UK
    Posts
    638
    Thanks
    86
    Thanked
    34 times in 33 posts
    • Ozaron's system
      • Motherboard:
      • MSI X570 Unify
      • CPU:
      • Ryzen 3700X
      • Memory:
      • 32GB Patriot Blackout @ 3800 CL16
      • Storage:
      • Toshiba X300 4TB (2), Samsung 850 Evo 500GB
      • Graphics card(s):
      • Sapphire 5700XT, Sapphire R9 Fury Nitro
      • PSU:
      • Seasonic M12-II 620w
      • Case:
      • Corsair Obsidian 500D
      • Operating System:
      • W10 Enterprise 64bit
      • Monitor(s):
      • Gigabyte G27QC
      • Internet:
      • 2.5 MB/s ↓ 0.86 MB/s ↑ ~20ms

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by scaryjim View Post
    Yep, your anti-virus may be making unsupported calls to kernel memory that will make your device unbootable if you apply a patch to fix a security vulnerability affecting kernel memory....
    I haven't even updated my 6600K for the IME vulnerability yet, someone please slow down this trainwreck.

  13. #105
    The late but legendary peterb - Onward and Upward peterb's Avatar
    Join Date
    Aug 2005
    Location
    Looking down & checking on swearing
    Posts
    19,378
    Thanks
    2,892
    Thanked
    3,403 times in 2,693 posts

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by scaryjim View Post

    Yep, your anti-virus may be making unsupported calls to kernel memory that will make your device unbootable if you apply a patch to fix a security vulnerability affecting kernel memory....
    Well, at least that ensures your system is no longer vulnerable! Result!
    (\__/)
    (='.'=)
    (")_(")

    Been helped or just 'Like' a post? Use the Thanks button!
    My broadband speed - 750 Meganibbles/minute

  14. Received thanks from:

    Iota (04-01-2018)

  15. #106
    Moosing about! CAT-THE-FIFTH's Avatar
    Join Date
    Aug 2006
    Location
    Not here
    Posts
    32,042
    Thanks
    3,909
    Thanked
    5,213 times in 4,005 posts
    • CAT-THE-FIFTH's system
      • Motherboard:
      • Less E-PEEN
      • CPU:
      • Massive E-PEEN
      • Memory:
      • RGB E-PEEN
      • Storage:
      • Not in any order
      • Graphics card(s):
      • EVEN BIGGER E-PEEN
      • PSU:
      • OVERSIZED
      • Case:
      • UNDERSIZED
      • Operating System:
      • DOS 6.22
      • Monitor(s):
      • NOT USUALLY ON....WHEN I POST
      • Internet:
      • FUNCTIONAL

    Re: Intel processor security flaw requires OS kernel level fix

    https://www.theregister.co.uk/2018/0...s_annotations/

    We translated Intel's crap attempt to spin its way out of CPU security bug PR nightmare
    As Linus Torvalds lets rip on Chipzilla
    LOL.

  16. #107
    Senior Member
    Join Date
    Feb 2009
    Location
    Castle Gresley
    Posts
    628
    Thanks
    28
    Thanked
    18 times in 18 posts
    • marshalex's system
      • Motherboard:
      • Asus P6T bios 1303
      • CPU:
      • Intel Core i7 920 @ 3.8Ghz
      • Memory:
      • 12GB Kingston Hyper X DDR3 1600MHz
      • Storage:
      • Samsung 840, WD Caviar Black 640Gb, WD Caviar Blue 1TB
      • Graphics card(s):
      • XFX Radeon HD 6950 XXX @915 MHz
      • PSU:
      • Antec TruePower New 650W
      • Case:
      • Coolermaster CM690
      • Operating System:
      • Windows 7 Professional x64
      • Monitor(s):
      • Dell ST2210
      • Internet:
      • Sky Fibre 38MB

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by CAT-THE-FIFTH View Post
    It's a pretty accurate summary of the Intel PR BS that has been spouted this morning.

  17. #108
    Moosing about! CAT-THE-FIFTH's Avatar
    Join Date
    Aug 2006
    Location
    Not here
    Posts
    32,042
    Thanks
    3,909
    Thanked
    5,213 times in 4,005 posts
    • CAT-THE-FIFTH's system
      • Motherboard:
      • Less E-PEEN
      • CPU:
      • Massive E-PEEN
      • Memory:
      • RGB E-PEEN
      • Storage:
      • Not in any order
      • Graphics card(s):
      • EVEN BIGGER E-PEEN
      • PSU:
      • OVERSIZED
      • Case:
      • UNDERSIZED
      • Operating System:
      • DOS 6.22
      • Monitor(s):
      • NOT USUALLY ON....WHEN I POST
      • Internet:
      • FUNCTIONAL

    Re: Intel processor security flaw requires OS kernel level fix

    Also someone has shown how they can use the vulnerability to steal passwords too:

    https://www.reddit.com/r/sysadmin/co..._in_real_time/

  18. #109
    Moosing about! CAT-THE-FIFTH's Avatar
    Join Date
    Aug 2006
    Location
    Not here
    Posts
    32,042
    Thanks
    3,909
    Thanked
    5,213 times in 4,005 posts
    • CAT-THE-FIFTH's system
      • Motherboard:
      • Less E-PEEN
      • CPU:
      • Massive E-PEEN
      • Memory:
      • RGB E-PEEN
      • Storage:
      • Not in any order
      • Graphics card(s):
      • EVEN BIGGER E-PEEN
      • PSU:
      • OVERSIZED
      • Case:
      • UNDERSIZED
      • Operating System:
      • DOS 6.22
      • Monitor(s):
      • NOT USUALLY ON....WHEN I POST
      • Internet:
      • FUNCTIONAL

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by marshalex View Post
    It's a pretty accurate summary of the Intel PR BS that has been spouted this morning.
    I can understand Intel doing it,but not hardware enthusiasts on some other forums defending it and then trying to make AMD sound like they have the issue to the "same" level,which is hilarious.

  19. #110
    Moosing about! CAT-THE-FIFTH's Avatar
    Join Date
    Aug 2006
    Location
    Not here
    Posts
    32,042
    Thanks
    3,909
    Thanked
    5,213 times in 4,005 posts
    • CAT-THE-FIFTH's system
      • Motherboard:
      • Less E-PEEN
      • CPU:
      • Massive E-PEEN
      • Memory:
      • RGB E-PEEN
      • Storage:
      • Not in any order
      • Graphics card(s):
      • EVEN BIGGER E-PEEN
      • PSU:
      • OVERSIZED
      • Case:
      • UNDERSIZED
      • Operating System:
      • DOS 6.22
      • Monitor(s):
      • NOT USUALLY ON....WHEN I POST
      • Internet:
      • FUNCTIONAL

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by DanceswithUnix View Post
    No drop in games performance then, nice.
    Computerbase.de did some benchmarks too.







    However,I would like to see more I/O bound games tested,especially many true open world games(Skyrim,FO4,etc).


    Also,this sounds a bit dodgy:

    http://uk.businessinsider.com/intel-...18-1?r=US&IR=T

    Intel was aware of the chip vulnerability when its CEO sold off $24 million in company stock

  20. #111
    Senior Member Xlucine's Avatar
    Join Date
    May 2014
    Posts
    2,162
    Thanks
    298
    Thanked
    188 times in 147 posts
    • Xlucine's system
      • Motherboard:
      • Asus prime B650M-A II
      • CPU:
      • 7900
      • Memory:
      • 32GB @ 4.8 Gt/s (don't want to wait for memory training)
      • Storage:
      • Crucial P5+ 2TB (boot), Crucial P5 1TB, Crucial MX500 1TB, Crucial MX100 512GB
      • Graphics card(s):
      • Asus Dual 4070 w/ shroud mod
      • PSU:
      • Fractal Design ION+ 560P
      • Case:
      • Silverstone TJ08-E
      • Operating System:
      • W10 pro
      • Monitor(s):
      • Viewsonic vx3211-2k-mhd, Dell P2414H
      • Internet:
      • Gigabit symmetrical

    Re: Intel processor security flaw requires OS kernel level fix

    Looks like as much of an issue for games as ryzen's "1080p performance"

  21. #112
    Moosing about! CAT-THE-FIFTH's Avatar
    Join Date
    Aug 2006
    Location
    Not here
    Posts
    32,042
    Thanks
    3,909
    Thanked
    5,213 times in 4,005 posts
    • CAT-THE-FIFTH's system
      • Motherboard:
      • Less E-PEEN
      • CPU:
      • Massive E-PEEN
      • Memory:
      • RGB E-PEEN
      • Storage:
      • Not in any order
      • Graphics card(s):
      • EVEN BIGGER E-PEEN
      • PSU:
      • OVERSIZED
      • Case:
      • UNDERSIZED
      • Operating System:
      • DOS 6.22
      • Monitor(s):
      • NOT USUALLY ON....WHEN I POST
      • Internet:
      • FUNCTIONAL

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by scaryjim View Post
    Just been tacked onto another complication with Windows patches via twitter:

    https://support.microsoft.com/en-us/...dates-released



    Yep, your anti-virus may be making unsupported calls to kernel memory that will make your device unbootable if you apply a patch to fix a security vulnerability affecting kernel memory....
    Avira have a patch coming soon.


Page 7 of 12 FirstFirst ... 45678910 ... LastLast

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •