'Kernel memory leaking' Intel processor design flaw forces Linux, Windows redesign

Discussion in 'other security issues & news' started by Minimalist, Jan 2, 2018.

  1. Krusty

    Krusty Registered Member

    That tool says this machine is not vulnerable. Two more to check.
     
  2. BoerenkoolMetWorst

    BoerenkoolMetWorst Registered Member

    The tool posted by @NICK ADSL UK is about a different, older vulnerability.
     
  3. Krusty

    Krusty Registered Member

    Ah, OK. Well my two older machines are OK by that tool but my newer machine is still vulnerable.
     
  4. emmjay

    emmjay Registered Member

    This is going to have a huge impact on OEMs. Why would they stay with Intel after this and on the heels of the IME/AMT fiasco ? Public perception, even if it is only the most informed users, is going to impact sales. Consumers are not Intel's largest market, but the enterprise is. Bad timing to have this revealed as it is only two years before enterprises have to go W10 or face Microsoft's wrath. Enterprises are buying workstations in the thousands.

    Secondly, if this patch results in a relatively new Intel based system suffering a 30% performance hit, just imagine how much fun that is going to be when the coin miners pile on. It will be a basically unusable system. Money circling the drain.
     
  5. WildByDesign

    WildByDesign Registered Member

  6. zapjb

    zapjb Registered Member

    If this affects gamers I expect holy **** to rain down upon Intel.
     
  7. WildByDesign

    WildByDesign Registered Member

    True. Although the perf hit may not be so bad if the cpu supports PCID feature. I used Sysinternals CoreInfo CLI app to determine this on my ultrabook.
     
  8. WildByDesign

    WildByDesign Registered Member

    Consumer guidance here: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002

    It's quite detailed. Some minor info on perf:
     
  9. WildByDesign

    WildByDesign Registered Member

    Chrome/Chromium browser related take on mitigation efforts...

    Actions Required to Mitigate Speculative Side-Channel Attack Techniques
    Link: https://www.chromium.org/Home/chromium-security/ssca

     
  10. WildByDesign

    WildByDesign Registered Member

  11. RockLobster

    RockLobster Registered Member

    A clear and concise explanation
    https://meltdownattack.com/

    Meltdown and Spectre

    Meltdown
    "every Intel processor which implements out-of-order execution is potentially affected, which is effectively every processor since 1995 (except Intel Itanium and Intel Atom before 2013)."

    Spectre
    "Almost every system is affected by Spectre: Desktops, Laptops, Cloud Servers, as well as Smartphones. More specifically, all modern processors capable of keeping many instructions in flight are potentially vulnerable. In particular, we have verified Spectre on Intel, AMD, and ARM processors."
     
  12. WildByDesign

    WildByDesign Registered Member

    SpecuCheck by Alex Ionescu

    SpecuCheck is a Windows utility for checking the state of the software mitigations against CVE-2017-5754 (Meltdown) and hardware mitigations against CVE-2017-5715 (Spectre)

    Link: https://github.com/ionescu007/SpecuCheck
     
    Last edited: Jan 4, 2018
  13. hawki

    hawki Registered Member

  14. hawki

    hawki Registered Member

    "...Spectre, affects most processors now in use, though the researchers believe this flaw is more difficult to exploit. There is no known fix for it, and it is not clear what chip makers like Intel will do to address the problem...

    Spectre is a problem in the fundamental way processors are designed, and the threat from Spectre is 'going to live with us for decades,' said Mr. Kocher, the president and chief scientist at Cryptography Research, a division of Rambus...

    'Whereas Meltdown is an urgent crisis, Spectre affects virtually all fast microprocessors,' Mr. Kocher said. An emphasis on speed while designing new chips has left them vulnerable to security issues, he said...

    A fix may not be available for Spectre until a new generation of chips hit the market.

    'This will be a festering problem over hardware life cycles. It’s not going to change tomorrow or the day after,..' ”

    https://www.nytimes.com/2018/01/03/...column-region&region=top-news&WT.nav=top-news
     
  15. hawki

    hawki Registered Member

    "...Microsoft, which uses Intel chips said it would roll out security updates on Thursday [for Meltdown], adding it had no information suggesting any compromised data..."

    http://www.bbc.com/news/technology-42561169
     
  16. JoWazzoo

    JoWazzoo Registered Member

  17. RockLobster

    RockLobster Registered Member

    Depends how you look at it, meltdown can and will be mitigated at the OS. Spectre is reportedly harder to exploit but there is no known fix. Which one do you think hackers all over the world are right now working on?
     
  18. Krusty

    Krusty Registered Member

  19. WildByDesign

    WildByDesign Registered Member

  20. paulderdash

    paulderdash Registered Member

  21. Krusty

    Krusty Registered Member

    I haven't bothered because until I receive a patch I'm almost certain my machines are vulnerable.
     
  22. reasonablePrivacy

    reasonablePrivacy Registered Member

    I don't think so. History repeats itself.
    https://marc.info/?l=openbsd-misc&m=118296441702631
     
  23. zapjb

    zapjb Registered Member

  24. reasonablePrivacy

    reasonablePrivacy Registered Member

    These patches (maybe there be more later) are applied to Linux kernel and gaming performance doesn't changed. Phoronix done benchmarking using Steam games like CS:GO, Dota 2, F1 2017 on Gnu/Linux system.
    https://www.phoronix.com/scan.php?page=news_item&px=x86-PTI-Initial-Gaming-Tests

    Data centers are in worse situation, but they are not regular consumers.
     
  25. BoerenkoolMetWorst

    BoerenkoolMetWorst Registered Member

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice