'Kernel memory leaking' Intel processor design flaw forces Linux, Windows redesign

Discussion in 'other security issues & news' started by Minimalist, Jan 2, 2018.

  1. Krusty

    Krusty Registered Member

    Joined:
    Feb 3, 2012
    Posts:
    10,257
    Location:
    Among the gum trees
    That tool says this machine is not vulnerable. Two more to check.
     
  2. BoerenkoolMetWorst

    BoerenkoolMetWorst Registered Member

    Joined:
    Dec 22, 2009
    Posts:
    4,875
    Location:
    Outer space
    The tool posted by @NICK ADSL UK is about a different, older vulnerability.
     
  3. Krusty

    Krusty Registered Member

    Joined:
    Feb 3, 2012
    Posts:
    10,257
    Location:
    Among the gum trees
    Ah, OK. Well my two older machines are OK by that tool but my newer machine is still vulnerable.
     
  4. emmjay

    emmjay Registered Member

    Joined:
    Jan 26, 2010
    Posts:
    1,552
    Location:
    Triassic
    This is going to have a huge impact on OEMs. Why would they stay with Intel after this and on the heels of the IME/AMT fiasco ? Public perception, even if it is only the most informed users, is going to impact sales. Consumers are not Intel's largest market, but the enterprise is. Bad timing to have this revealed as it is only two years before enterprises have to go W10 or face Microsoft's wrath. Enterprises are buying workstations in the thousands.

    Secondly, if this patch results in a relatively new Intel based system suffering a 30% performance hit, just imagine how much fun that is going to be when the coin miners pile on. It will be a basically unusable system. Money circling the drain.
     
  5. WildByDesign

    WildByDesign Registered Member

    Joined:
    Sep 24, 2013
    Posts:
    2,587
    Location:
    Toronto, Canada
  6. zapjb

    zapjb Registered Member

    Joined:
    Nov 15, 2005
    Posts:
    5,559
    Location:
    USA still the best. But barely.
    If this affects gamers I expect holy **** to rain down upon Intel.
     
  7. WildByDesign

    WildByDesign Registered Member

    Joined:
    Sep 24, 2013
    Posts:
    2,587
    Location:
    Toronto, Canada
    True. Although the perf hit may not be so bad if the cpu supports PCID feature. I used Sysinternals CoreInfo CLI app to determine this on my ultrabook.
     
  8. WildByDesign

    WildByDesign Registered Member

    Joined:
    Sep 24, 2013
    Posts:
    2,587
    Location:
    Toronto, Canada
    Consumer guidance here: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002

    It's quite detailed. Some minor info on perf:
     
  9. WildByDesign

    WildByDesign Registered Member

    Joined:
    Sep 24, 2013
    Posts:
    2,587
    Location:
    Toronto, Canada
    Chrome/Chromium browser related take on mitigation efforts...

    Actions Required to Mitigate Speculative Side-Channel Attack Techniques
    Link: https://www.chromium.org/Home/chromium-security/ssca

     
  10. WildByDesign

    WildByDesign Registered Member

    Joined:
    Sep 24, 2013
    Posts:
    2,587
    Location:
    Toronto, Canada
  11. RockLobster

    RockLobster Registered Member

    Joined:
    Nov 8, 2007
    Posts:
    1,812
    A clear and concise explanation
    https://meltdownattack.com/

    Meltdown and Spectre

    Meltdown
    "every Intel processor which implements out-of-order execution is potentially affected, which is effectively every processor since 1995 (except Intel Itanium and Intel Atom before 2013)."

    Spectre
    "Almost every system is affected by Spectre: Desktops, Laptops, Cloud Servers, as well as Smartphones. More specifically, all modern processors capable of keeping many instructions in flight are potentially vulnerable. In particular, we have verified Spectre on Intel, AMD, and ARM processors."
     
  12. WildByDesign

    WildByDesign Registered Member

    Joined:
    Sep 24, 2013
    Posts:
    2,587
    Location:
    Toronto, Canada
    SpecuCheck by Alex Ionescu

    SpecuCheck is a Windows utility for checking the state of the software mitigations against CVE-2017-5754 (Meltdown) and hardware mitigations against CVE-2017-5715 (Spectre)

    Link: https://github.com/ionescu007/SpecuCheck
     
    Last edited: Jan 4, 2018
  13. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,080
    Location:
    DC Metro Area
  14. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,080
    Location:
    DC Metro Area
    "...Spectre, affects most processors now in use, though the researchers believe this flaw is more difficult to exploit. There is no known fix for it, and it is not clear what chip makers like Intel will do to address the problem...

    Spectre is a problem in the fundamental way processors are designed, and the threat from Spectre is 'going to live with us for decades,' said Mr. Kocher, the president and chief scientist at Cryptography Research, a division of Rambus...

    'Whereas Meltdown is an urgent crisis, Spectre affects virtually all fast microprocessors,' Mr. Kocher said. An emphasis on speed while designing new chips has left them vulnerable to security issues, he said...

    A fix may not be available for Spectre until a new generation of chips hit the market.

    'This will be a festering problem over hardware life cycles. It’s not going to change tomorrow or the day after,..' ”

    https://www.nytimes.com/2018/01/03/...column-region&region=top-news&WT.nav=top-news
     
  15. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,080
    Location:
    DC Metro Area
    "...Microsoft, which uses Intel chips said it would roll out security updates on Thursday [for Meltdown], adding it had no information suggesting any compromised data..."

    http://www.bbc.com/news/technology-42561169
     
  16. JoWazzoo

    JoWazzoo Registered Member

    Joined:
    Nov 11, 2008
    Posts:
    241
    Location:
    Ether
  17. RockLobster

    RockLobster Registered Member

    Joined:
    Nov 8, 2007
    Posts:
    1,812
    Depends how you look at it, meltdown can and will be mitigated at the OS. Spectre is reportedly harder to exploit but there is no known fix. Which one do you think hackers all over the world are right now working on?
     
  18. Krusty

    Krusty Registered Member

    Joined:
    Feb 3, 2012
    Posts:
    10,257
    Location:
    Among the gum trees
  19. WildByDesign

    WildByDesign Registered Member

    Joined:
    Sep 24, 2013
    Posts:
    2,587
    Location:
    Toronto, Canada
  20. paulderdash

    paulderdash Registered Member

    Joined:
    Dec 27, 2013
    Posts:
    4,644
    Location:
    Under a bushel ...
  21. Krusty

    Krusty Registered Member

    Joined:
    Feb 3, 2012
    Posts:
    10,257
    Location:
    Among the gum trees
    I haven't bothered because until I receive a patch I'm almost certain my machines are vulnerable.
     
  22. reasonablePrivacy

    reasonablePrivacy Registered Member

    Joined:
    Oct 7, 2017
    Posts:
    2,019
    Location:
    Member state of European Union
    I don't think so. History repeats itself.
    https://marc.info/?l=openbsd-misc&m=118296441702631
     
  23. zapjb

    zapjb Registered Member

    Joined:
    Nov 15, 2005
    Posts:
    5,559
    Location:
    USA still the best. But barely.
  24. reasonablePrivacy

    reasonablePrivacy Registered Member

    Joined:
    Oct 7, 2017
    Posts:
    2,019
    Location:
    Member state of European Union
    These patches (maybe there be more later) are applied to Linux kernel and gaming performance doesn't changed. Phoronix done benchmarking using Steam games like CS:GO, Dota 2, F1 2017 on Gnu/Linux system.
    https://www.phoronix.com/scan.php?page=news_item&px=x86-PTI-Initial-Gaming-Tests

    Data centers are in worse situation, but they are not regular consumers.
     
  25. BoerenkoolMetWorst

    BoerenkoolMetWorst Registered Member

    Joined:
    Dec 22, 2009
    Posts:
    4,875
    Location:
    Outer space
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.