ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Major Intel CPU vulnerability

    IT Discussion
    29
    260
    26.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller
      last edited by

      Here is how ExtremeTech words it: "Over the past few days we’ve covered major new security risks that struck at a number of modern microprocessors from Intel and to a much lesser extent, ARM and AMD. "

      1 Reply Last reply Reply Quote 0
      • scottalanmillerS
        scottalanmiller
        last edited by

        What process is Google Parlance? "Meltdown is Variant 3 in ARM, AMD, and Google parlance."

        1 Reply Last reply Reply Quote 0
        • scottalanmillerS
          scottalanmiller
          last edited by

          This statement certainly makes Intel's design a flaw, contradicting Intel's own statements: "Intel is badly hit by Meltdown because its speculative execution methods are fairly aggressive. Specifically, Intel CPUs are allowed to access kernel memory when performing speculative execution, even when the application in question is running in user memory space. The CPU does check to see if an invalid memory access occurs, but it performs the check after speculative execution, not before."

          1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller
            last edited by

            This is useful, ARM is not impacted but "will be in the future": AMD and ARM appear largely immune to Meltdown, though ARM’s upcoming Cortex-A75 is apparently impacted.

            1 Reply Last reply Reply Quote 2
            • scottalanmillerS
              scottalanmiller
              last edited by

              AMD Zen specifically has hardware that kills Spectre. So it's not a universal threat, even against procs that use all of the features that lead to it.

              1 Reply Last reply Reply Quote 1
              • scottalanmillerS
                scottalanmiller
                last edited by

                https://www.raspberrypi.org/blog/why-raspberry-pi-isnt-vulnerable-to-spectre-or-meltdown/

                1 Reply Last reply Reply Quote 1
                • ObsolesceO
                  Obsolesce
                  last edited by

                  Anyone see this: https://www.phoronix.com/scan.php?page=article&item=linux-kpti-wine&num=1

                  1 Reply Last reply Reply Quote 0
                  • scottalanmillerS
                    scottalanmiller
                    last edited by

                    Our database vendor just reached out to tell us that 10-15% is the measured impact for our database.

                    ObsolesceO FredtxF 2 Replies Last reply Reply Quote 1
                    • ObsolesceO
                      Obsolesce @scottalanmiller
                      last edited by

                      @scottalanmiller said in Major Intel CPU vulnerability:

                      Our database vendor just reached out to tell us that 10-15% is the measured impact for our database.

                      That's substantial...

                      1 Reply Last reply Reply Quote 1
                      • FredtxF
                        Fredtx @scottalanmiller
                        last edited by

                        @scottalanmiller said in Major Intel CPU vulnerability:

                        Our database vendor just reached out to tell us that 10-15% is the measured impact for our database.

                        So does it affect performance only “after” it’s been patched?

                        scottalanmillerS 1 Reply Last reply Reply Quote 0
                        • DanpD
                          Danp
                          last edited by

                          https://arstechnica.com/gadgets/2018/01/intel-faces-class-action-lawsuits-regarding-meltdown-and-spectre/

                          DustinB3403D 1 Reply Last reply Reply Quote 2
                          • DustinB3403D
                            DustinB3403 @Danp
                            last edited by

                            @danp said in Major Intel CPU vulnerability:

                            https://arstechnica.com/gadgets/2018/01/intel-faces-class-action-lawsuits-regarding-meltdown-and-spectre/

                            Not surprising, unfortunately there is no way that they wouldn't be sued. If a patch has been developed this quickly, then there is clearly something majorly broken, but easily remedied.

                            1 Reply Last reply Reply Quote 0
                            • scottalanmillerS
                              scottalanmiller @Fredtx
                              last edited by

                              @fredtx said in Major Intel CPU vulnerability:

                              @scottalanmiller said in Major Intel CPU vulnerability:

                              Our database vendor just reached out to tell us that 10-15% is the measured impact for our database.

                              So does it affect performance only “after” it’s been patched?

                              Yes

                              1 Reply Last reply Reply Quote 1
                              • ObsolesceO
                                Obsolesce
                                last edited by

                                Fedora's fix: https://fedoramagazine.org/kpti-new-kernel-feature-mitigate-meltdown/

                                1 Reply Last reply Reply Quote 0
                                • zachary715Z
                                  zachary715
                                  last edited by

                                  Good article about how the likes of Vultr, Digital Ocean, Linode, and others are working together to try and solve the issues this creates. Sounds like they learned same time we did.

                                  https://techcrunch.com/2018/01/06/how-tier-2-cloud-vendors-banded-together-to-cope-with-spectre-and-meltdown/

                                  scottalanmillerS 1 Reply Last reply Reply Quote 2
                                  • scottalanmillerS
                                    scottalanmiller @zachary715
                                    last edited by

                                    @zachary715 said in Major Intel CPU vulnerability:

                                    Good article about how the likes of Vultr, Digital Ocean, Linode, and others are working together to try and solve the issues this creates. Sounds like they learned same time we did.

                                    https://techcrunch.com/2018/01/06/how-tier-2-cloud-vendors-banded-together-to-cope-with-spectre-and-meltdown/

                                    Which means Intel wasn’t disclosing to key vendors. 😞

                                    1 Reply Last reply Reply Quote 1
                                    • zachary715Z
                                      zachary715
                                      last edited by

                                      From my reading, they were disclosing to the big boys at Amazon, Microsoft, Google, but not to these other guys. So now they're scrambling.

                                      I guess in reality you can't really reach out to EVERYONE affected immediately. You have to draw the line somewhere of who knows ahead of time and who doesn't. I just would have thought some of these providers were large enough to justify disclosure

                                      scottalanmillerS 3 Replies Last reply Reply Quote 1
                                      • scottalanmillerS
                                        scottalanmiller @zachary715
                                        last edited by

                                        @zachary715 said in Major Intel CPU vulnerability:

                                        From my reading, they were disclosing to the big boys at Amazon, Microsoft, Google, but not to these other guys. So now they're scrambling.

                                        Right, and that's what I think is terrible. Some customers (not us) get to know about security problems and we (and likely most of our vendors), do not. It's Intel's right to treat some customers like total shit, and it's our right to see them as dishonest pieces of crap that I don't trust at all.

                                        1 Reply Last reply Reply Quote 1
                                        • scottalanmillerS
                                          scottalanmiller @zachary715
                                          last edited by

                                          @zachary715 said in Major Intel CPU vulnerability:

                                          I guess in reality you can't really reach out to EVERYONE affected immediately.

                                          Yes, you can. And they decided that they had other priorities that didn't involve their customers. They were focused on trying to hide as much as they could, for as long as they could; rather than being honest and doing the right thing.

                                          And they totally screwed a lot of customers, big and small. They made it extremely clear that only the very biggest, most powerful companies that could sue the crap out of them get the "best" security protection. Everyone else is thrown to the wolves.

                                          1 Reply Last reply Reply Quote 1
                                          • scottalanmillerS
                                            scottalanmiller @zachary715
                                            last edited by

                                            @zachary715 said in Major Intel CPU vulnerability:

                                            I just would have thought some of these providers were large enough to justify disclosure

                                            There is an easy guide for where to draw the line - anyone who purchased an Intel CPU was big enough to have gotten the flaw, and therefore had a right to know the instant Intel found out. Intel has an ethical, and hopefully legal, obligation to have informed their customers that they were (and are) at risk. Knowing that there was this risk and intionally hiding it should have major legal ramifications, beyond the financial ones.

                                            There might be a time where it is okay to find a security hole and try to patch it. But once you are telling SOME customers, and not others, you've crossed a serious line.

                                            For example, what if one of the big customers that they told was the NSA or the Russian or Chinese government, or some hacker group, a malware vendor, or anyone who has employees that aren't 100% trusted? These are big vendors with hundreds of thousands of employees to which this was disclosed. And we know that it was leaked to the public. That means that the bad guys knew before it went public.

                                            I think that people are overlooking how insanely bad and anti-secure it is to pick a few giant companies to tell, but not others. It's not just that Intel likes those few and doesn't like the others. It's that Intel actively disclosed to a few companies how they could hack all of Intel's other customers.

                                            Intel forced all of us to trust not only Intel (whom I no longer trust) but anyone that Intel trusted without telling us that they were selling out our security secrets.

                                            1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 12
                                            • 13
                                            • 1 / 13
                                            • First post
                                              Last post