Page 8 of 12 FirstFirst ... 567891011 ... LastLast
Results 113 to 128 of 186

Thread: Intel processor security flaw requires OS kernel level fix

  1. #113
    Banhammer in peace PeterB kalniel's Avatar
    Join Date
    Aug 2005
    Posts
    31,038
    Thanks
    1,880
    Thanked
    3,379 times in 2,716 posts
    • kalniel's system
      • Motherboard:
      • Gigabyte Z390 Aorus Ultra
      • CPU:
      • Intel i9 9900k
      • Memory:
      • 32GB DDR4 3200 CL16
      • Storage:
      • 1TB Samsung 970Evo+ NVMe
      • Graphics card(s):
      • nVidia GTX 1060 6GB
      • PSU:
      • Seasonic 600W
      • Case:
      • Cooler Master HAF 912
      • Operating System:
      • Win 10 Pro x64
      • Monitor(s):
      • Dell S2721DGF
      • Internet:
      • rubbish

    Re: Intel processor security flaw requires OS kernel level fix

    Panda aren't ready yet it seems. Though what's to stop previously naughty AVs just setting the reg key?

  2. #114
    Moosing about! CAT-THE-FIFTH's Avatar
    Join Date
    Aug 2006
    Location
    Not here
    Posts
    32,042
    Thanks
    3,909
    Thanked
    5,213 times in 4,005 posts
    • CAT-THE-FIFTH's system
      • Motherboard:
      • Less E-PEEN
      • CPU:
      • Massive E-PEEN
      • Memory:
      • RGB E-PEEN
      • Storage:
      • Not in any order
      • Graphics card(s):
      • EVEN BIGGER E-PEEN
      • PSU:
      • OVERSIZED
      • Case:
      • UNDERSIZED
      • Operating System:
      • DOS 6.22
      • Monitor(s):
      • NOT USUALLY ON....WHEN I POST
      • Internet:
      • FUNCTIONAL

    Re: Intel processor security flaw requires OS kernel level fix

    Hardwareluxx did some testing too:

    https://www.hardwareluxx.de/index.ph...or-design.html


    Das Testsystem
    Prozessor Intel Core i7-3960X 3,3 @ 3,9 GHz
    Kühlung Corsair H110i GT All-in-One-Wasserkühlung
    Mainboard ASUS P9X97 Deluxe
    Arbeitsspeicher G.Skill
    SSD OCZ Arc 100 240 GB
    Netzteil Seasonic Platinum Series 1.000 Watt
    Betriebssystem Windows 10 64 Bit
    Gehäuse Fractal Design Define R5


    A GTX1080TI was used.

  3. #115
    Moosing about! CAT-THE-FIFTH's Avatar
    Join Date
    Aug 2006
    Location
    Not here
    Posts
    32,042
    Thanks
    3,909
    Thanked
    5,213 times in 4,005 posts
    • CAT-THE-FIFTH's system
      • Motherboard:
      • Less E-PEEN
      • CPU:
      • Massive E-PEEN
      • Memory:
      • RGB E-PEEN
      • Storage:
      • Not in any order
      • Graphics card(s):
      • EVEN BIGGER E-PEEN
      • PSU:
      • OVERSIZED
      • Case:
      • UNDERSIZED
      • Operating System:
      • DOS 6.22
      • Monitor(s):
      • NOT USUALLY ON....WHEN I POST
      • Internet:
      • FUNCTIONAL

    Re: Intel processor security flaw requires OS kernel level fix

    Also from the Hardware Unboxed video:

    Apparently the full fix will also rely on firmware updates from Intel, so I’ll keep you guys up to date with news and benchmark results.
    So,the patch tested so far is not the full one.

  4. #116
    Senior Member
    Join Date
    Jul 2003
    Location
    3rd Rock from the sun..
    Posts
    463
    Thanks
    15
    Thanked
    4 times in 3 posts
    • Dave_07's system
      • Motherboard:
      • MSI X99A Gaming 7
      • CPU:
      • Intel Core i7 5930k (6 core) @ 4.3Ghz
      • Memory:
      • 16Gb Corsair DDR4 2800Mhz
      • Storage:
      • 2x 500Gb SSD's (Raid 0)
      • Graphics card(s):
      • 2x SLI MSI GTX 980
      • PSU:
      • EVGA 1000w PSU
      • Case:
      • Corsair C70
      • Operating System:
      • Windows 7 Pro 64Bit
      • Monitor(s):
      • G-Sync AOC G2460PG 1080p and LG Flatron W2261VP
      • Internet:
      • 17.5Mb Broadband.

    Re: Intel processor security flaw requires OS kernel level fix

    Is the vulnerability as bad as the news and some tech sites are making out ? - at least from a home user standpoint. I'm no tech wiz but this flaw seems to just render available the same vulnerabilities as a normal key logger or sniffer would do. I mean it's just opening up the potential to 'read' kernel level content. It's not allowing execution of any code at kernel level right ?

    Or am I misunderstanding how it all works ?
    Intel Core i7 5930k @ 3.7Ghz Turbo
    MSI X99A Gaming 7
    16Gb Corsair DDR4 2667Mhz
    2x SLI MSI GTX 980
    2x 500Gb SSD's (Raid 0)
    EVGA 1000w PSU
    Windows 7 Pro 64Bit
    G-Sync AOC G2460PG 1080p
    LG Flatron W2261VP

  5. #117
    Editable... jimbouk's Avatar
    Join Date
    Aug 2005
    Location
    Exeter
    Posts
    3,146
    Thanks
    334
    Thanked
    294 times in 242 posts
    • jimbouk's system
      • Motherboard:
      • Asrock B450M-HDV R4.0
      • CPU:
      • AMD Ryzen 5 3600
      • Memory:
      • Corsair Vengeance LPX 16 GB (2 x 8 GB) DDR4 3200 MHz C16
      • Storage:
      • Sabrent Rocket Q 1TB NVMe PCIe M.2 2280
      • Graphics card(s):
      • PowerColor Radeon RX 6700 XT 12GB Fighter
      • PSU:
      • Seasonic Core Gold GC-650
      • Case:
      • Lian-Li PC-V1100 ATX
      • Operating System:
      • Windows 10 Pro
      • Monitor(s):
      • AOC CU34G2/BK 34" Widescreen
      • Internet:
      • EE FTTP

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by Dave_07 View Post
    Is the vulnerability as bad as the news and some tech sites are making out ? - at least from a home user standpoint. I'm no tech wiz but this flaw seems to just render available the same vulnerabilities as a normal key logger or sniffer would do. I mean it's just opening up the potential to 'read' kernel level content. It's not allowing execution of any code at kernel level right ?
    But this one doesn't rely on the stupidity of a user to download and install said key logger or sniffer. I can imagine the 'bad guys' are trying to squirrel it away into adverts so it'll run when you browse the interwebs.

  6. #118
    root Member DanceswithUnix's Avatar
    Join Date
    Jan 2006
    Location
    In the middle of a core dump
    Posts
    13,009
    Thanks
    781
    Thanked
    1,568 times in 1,325 posts
    • DanceswithUnix's system
      • Motherboard:
      • Asus X470-PRO
      • CPU:
      • 5900X
      • Memory:
      • 32GB 3200MHz ECC
      • Storage:
      • 2TB Linux, 2TB Games (Win 10)
      • Graphics card(s):
      • Asus Strix RX Vega 56
      • PSU:
      • 650W Corsair TX
      • Case:
      • Antec 300
      • Operating System:
      • Fedora 39 + Win 10 Pro 64 (yuk)
      • Monitor(s):
      • Benq XL2730Z 1440p + Iiyama 27" 1440p
      • Internet:
      • Zen 900Mb/900Mb (CityFibre FttP)

    Re: Intel processor security flaw requires OS kernel level fix

    Interesting read on how "retpolines" are being made into a compiler option to make one of the Spectre attacks go away. That's horrible, I have to wonder if just turning off speculative indirect jumps in the kernel space would be less than the <1.5% performance hit being seen here.

    https://support.google.com/faqs/answer/7625886

  7. #119
    Senior Member
    Join Date
    Jun 2008
    Posts
    1,495
    Thanks
    2
    Thanked
    143 times in 119 posts
    • BobF64's system
      • Motherboard:
      • Asus P8Z77-V Pro
      • CPU:
      • Intel Core i7-3770K
      • Memory:
      • 16GB Corsair XMS3 PC3-12800
      • Storage:
      • Multiple HDD and SSD drives
      • Graphics card(s):
      • ASUS DUAL-GTX1060-06G
      • PSU:
      • 750W Silverstone Strider Gold Evolution
      • Case:
      • Silverstone Fortress FT02
      • Operating System:
      • Windows 10 x64 Pro
      • Monitor(s):
      • HP ZR24w

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by ik9000 View Post
    Yep, according to the beeb it affects all processors going back as far as 1994 - not sure which exploit and how true that is, but what would that even be? An old 286?
    Out of order execution was first featured in Pentium Pro, and subsequently the Pentium II and its successors.

  8. #120
    Senior Member
    Join Date
    Jul 2003
    Location
    3rd Rock from the sun..
    Posts
    463
    Thanks
    15
    Thanked
    4 times in 3 posts
    • Dave_07's system
      • Motherboard:
      • MSI X99A Gaming 7
      • CPU:
      • Intel Core i7 5930k (6 core) @ 4.3Ghz
      • Memory:
      • 16Gb Corsair DDR4 2800Mhz
      • Storage:
      • 2x 500Gb SSD's (Raid 0)
      • Graphics card(s):
      • 2x SLI MSI GTX 980
      • PSU:
      • EVGA 1000w PSU
      • Case:
      • Corsair C70
      • Operating System:
      • Windows 7 Pro 64Bit
      • Monitor(s):
      • G-Sync AOC G2460PG 1080p and LG Flatron W2261VP
      • Internet:
      • 17.5Mb Broadband.

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by jimbouk View Post
    But this one doesn't rely on the stupidity of a user to download and install said key logger or sniffer. I can imagine the 'bad guys' are trying to squirrel it away into adverts so it'll run when you browse the interwebs.

    Oh yeah, that's ofc I think the main gateway for the majority of infections now-a-days, is via the browser. But the point I was just picking up on, is even if malicious code designed to take advantaged of this exploit does get onto a system, the most it will be able to do is just 'decern' some kernel level content right ? It's not like it's going to actually execute kernel level code right ?
    Last edited by Dave_07; 04-01-2018 at 04:59 PM.
    Intel Core i7 5930k @ 3.7Ghz Turbo
    MSI X99A Gaming 7
    16Gb Corsair DDR4 2667Mhz
    2x SLI MSI GTX 980
    2x 500Gb SSD's (Raid 0)
    EVGA 1000w PSU
    Windows 7 Pro 64Bit
    G-Sync AOC G2460PG 1080p
    LG Flatron W2261VP

  9. #121
    Moosing about! CAT-THE-FIFTH's Avatar
    Join Date
    Aug 2006
    Location
    Not here
    Posts
    32,042
    Thanks
    3,909
    Thanked
    5,213 times in 4,005 posts
    • CAT-THE-FIFTH's system
      • Motherboard:
      • Less E-PEEN
      • CPU:
      • Massive E-PEEN
      • Memory:
      • RGB E-PEEN
      • Storage:
      • Not in any order
      • Graphics card(s):
      • EVEN BIGGER E-PEEN
      • PSU:
      • OVERSIZED
      • Case:
      • UNDERSIZED
      • Operating System:
      • DOS 6.22
      • Monitor(s):
      • NOT USUALLY ON....WHEN I POST
      • Internet:
      • FUNCTIONAL

    Re: Intel processor security flaw requires OS kernel level fix

    Its interesting how the tests with the Core i7 7700K and Core i7 3960X seems to show more performance drop in games than the Core i7 8700K tested by Hardware Unboxed.

    The problem is if this affects older CPUs worse than newer ones,then its not going to be highlighted by many websites as they will only test the latest high-end CPUs.

    Plus what about a lower end CPU like a Core i3 for example??

    Also the issue is all the games tested so far seem quite multi-threaded,so what about the ones based on older engines which are probably more I/O limited??

  10. #122
    Senior Member
    Join Date
    Dec 2013
    Posts
    3,526
    Thanks
    504
    Thanked
    468 times in 326 posts

    Re: Intel processor security flaw requires OS kernel level fix

    From my admittedly limited understand the performance hit will be minimal on any (only Intel?) processor that implements PCID (Process context identifiers) (was that from Sandy Bridge onwards?) as without PCID the information in whatever cache (TLB?) has to be cleared before a context switch so as not to expose ring 0 (Kernel) data to a ring 3 (user) process, however with PCID (afaik) the data stored in the cache is fenced off and only accessible with the relevant permission so when a context switch is needed there's no need to flush the cache.

  11. #123
    Senior Member
    Join Date
    May 2014
    Posts
    2,385
    Thanks
    181
    Thanked
    304 times in 221 posts

    Re: Intel processor security flaw requires OS kernel level fix

    The big question that we're all missing. Are the new VIA processors vulnerable xD

  12. #124
    Moosing about! CAT-THE-FIFTH's Avatar
    Join Date
    Aug 2006
    Location
    Not here
    Posts
    32,042
    Thanks
    3,909
    Thanked
    5,213 times in 4,005 posts
    • CAT-THE-FIFTH's system
      • Motherboard:
      • Less E-PEEN
      • CPU:
      • Massive E-PEEN
      • Memory:
      • RGB E-PEEN
      • Storage:
      • Not in any order
      • Graphics card(s):
      • EVEN BIGGER E-PEEN
      • PSU:
      • OVERSIZED
      • Case:
      • UNDERSIZED
      • Operating System:
      • DOS 6.22
      • Monitor(s):
      • NOT USUALLY ON....WHEN I POST
      • Internet:
      • FUNCTIONAL

    Re: Intel processor security flaw requires OS kernel level fix

    Someone tested a Core i5 4690K based system with an RX580 8GB:

    https://www.reddit.com/r/pcgaming/co...tch_impact_on/



    Quote Originally Posted by Tabbykatze View Post
    The big question that we're all missing. Are the new VIA processors vulnerable xD
    Nobody will care about them,since it is not worth the effort,hence they are INVINCIBLE!!

  13. Received thanks from:

    Xlucine (04-01-2018)

  14. #125
    Missed by us all - RIP old boy spacein_vader's Avatar
    Join Date
    Sep 2014
    Location
    Darkest Northamptonshire
    Posts
    2,015
    Thanks
    184
    Thanked
    1,086 times in 410 posts
    • spacein_vader's system
      • Motherboard:
      • MSI B450 Tomahawk Max
      • CPU:
      • Ryzen 5 3600
      • Memory:
      • 2x8GB Patriot Steel DDR4 3600mhz
      • Storage:
      • 1tb Sabrent Rocket NVMe (boot), 500GB Crucial MX100, 1TB Crucial MX200
      • Graphics card(s):
      • Gigabyte Radeon RX5700 Gaming OC
      • PSU:
      • Corsair HX 520W modular
      • Case:
      • Fractal Design Meshify C
      • Operating System:
      • Windows 10 Pro
      • Monitor(s):
      • BenQ GW2765, Dell Ultrasharp U2412
      • Internet:
      • Zen Internet

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by Dave_07 View Post
    Oh yeah, that's ofc I think the main gateway for the majority of infections now-a-days, is via the browser. But the point I was just picking up on, is even if malicious code designed to take advantaged of this exploit does get onto a system, the most it will be able to do is just 'decern' some kernel level content right ? It's not like it's going to actually execute kernel level code right ?
    You're correct in isolation. But they can get hold of sensitive data like passwords (including potentially admin/root passwords) which allow them to use another method to execute code.

  15. #126
    Senior Member
    Join Date
    Apr 2013
    Location
    MI
    Posts
    231
    Thanks
    0
    Thanked
    8 times in 8 posts
    • globalwarning's system
      • CPU:
      • AMD 1090T
      • Memory:
      • RIP JAW DDR3 1600 4x4GB
      • Graphics card(s):
      • Sapphire 7950 OC (Boost)
      • PSU:
      • Seasonic 750W
      • Case:
      • Old crap
      • Operating System:
      • Window 7 Ultimate 64bit
      • Monitor(s):
      • Hanns-G 281DPB

    Re: Intel processor security flaw requires OS kernel level fix

    I would laugh if Intel knew about this all along, but considered it worthwhile to keep up the "competitive edge" over AMD...

    edit: grammar

  16. #127
    Senior Member
    Join Date
    Jul 2003
    Location
    3rd Rock from the sun..
    Posts
    463
    Thanks
    15
    Thanked
    4 times in 3 posts
    • Dave_07's system
      • Motherboard:
      • MSI X99A Gaming 7
      • CPU:
      • Intel Core i7 5930k (6 core) @ 4.3Ghz
      • Memory:
      • 16Gb Corsair DDR4 2800Mhz
      • Storage:
      • 2x 500Gb SSD's (Raid 0)
      • Graphics card(s):
      • 2x SLI MSI GTX 980
      • PSU:
      • EVGA 1000w PSU
      • Case:
      • Corsair C70
      • Operating System:
      • Windows 7 Pro 64Bit
      • Monitor(s):
      • G-Sync AOC G2460PG 1080p and LG Flatron W2261VP
      • Internet:
      • 17.5Mb Broadband.

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by globalwarning View Post
    I would laugh if Intel knew about this all along, but considered it worthwhile to keep up the "competitive edge" over AMD...

    edit: grammar

    lol well the CEO sure knew, as he dumped pretty much all of his personal stock shares in intel a few months before all this leaked out.
    Intel Core i7 5930k @ 3.7Ghz Turbo
    MSI X99A Gaming 7
    16Gb Corsair DDR4 2667Mhz
    2x SLI MSI GTX 980
    2x 500Gb SSD's (Raid 0)
    EVGA 1000w PSU
    Windows 7 Pro 64Bit
    G-Sync AOC G2460PG 1080p
    LG Flatron W2261VP

  17. #128
    Senior Member
    Join Date
    Dec 2013
    Posts
    3,526
    Thanks
    504
    Thanked
    468 times in 326 posts

    Re: Intel processor security flaw requires OS kernel level fix

    Quote Originally Posted by globalwarning View Post
    I would laugh if Intel knew about this all along, but considered it worthwhile to keep up the "competitive edge" over AMD...
    I'd be pretty shocked if they didn't know about it all along TBH, obviously like any integrated circuit designer they'd never admit knowledge, or voluntarily divulge, information of an errata as that would be like telling the world the lock on your front door isn't all that, but the fact they introduced PCID (Process context identifiers) in latter designs kind of gives away the fact that they where aware of the potential for data to leak from one process to another.

    It also probably explains why the Zen microarchitecture is less, or not at all, effected as it was pretty much designed from the ground up whereas Intel's current processors are all based on the basic Core design that was introduced almost two decades ago but with hundreds of iterations made along the way.

Page 8 of 12 FirstFirst ... 567891011 ... LastLast

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •