Originally posted by ratdude747
View Post
Announcement
Collapse
No announcement yet.
Some serious security bug in INTEL CPUs?? Since Westmere possibly
Collapse
X
-
Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly
-
Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly
^
yay for running unpatched for ages...
Leave a comment:
-
Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly
Possibly off-topic: Some recent windows 7 update keeps making my wife's twin Opteron X2 BSOD. For now she's on my Dual Xeon Westmere rig until I get back from a long company trip. Possibly related to the Intel patch reboot issue?
Leave a comment:
-
Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly
Originally posted by Per Hansson View PostIt has a fucking BSOD issue
Leave a comment:
-
Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly
Originally posted by stj View Postsays it all, my AMD systems dont reboot - ever.
so for the sake of completeness, can intel tell us how often their cpu's reboot normally?Originally posted by hannah View PostI understand that there isn't a clear cut answer, but Intel is really getting on my nerves with the information manipulation. Feels like everything Intel says is a lie now.
No where does Intel mention BSOD (Blue Screen) in their public communication.
But that is exactly what it is:
Just because the default in Windows is to restart _after_ a BSOD does not mean the CPU has a restart issue.
It has a fucking BSOD issue Intel!
Leave a comment:
-
Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly
Originally posted by Topcat View PostThat's the age-old argument in the PC world...much like Ford vs Chevy in the car world....or coke vs pepsi....republican vs democrat...its an endless argument that no winner will ever emerge from.
Leave a comment:
-
Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly
Originally posted by llonen View PostStupid question perhaps, but I have for some time been planning to deploy linux, will it help with this problem or make no difference since this is a hardware issue.
So, does your OS (or any applications) allow for the entry (deliberate or clandestine) of "instructions" (which may or may not be direct machine code) from an external/remote, untrusted source?
A machine that doesn't have a network connection is immediately less vulnerable. Likewise, the absence of a (privileged) "console" or other mechanisms for introducing new media to the system (autoplay, executables invoked from shells, etc.)
Likewise, an OS that requires signed executables (presumably, the CA vouches for the binaries that it signs) is largely immune as there's an intermediary required to get the code to execute.
Your first order of business is thus to nail down any paths into the system that can be leveraged to inject the sort of code that can tickle these particular exploits.
Leave a comment:
-
Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly
I didn't see 5400-series Xeons (harpertown) in the master list from Intel....which would also cover yorkfield and those similar (C2Q)....either they're not susceptible or they didn't go back that far....but LGA771 was the predecessor to LGA1366 (nehalem & westmere, 5500 and 5600 series), which is on the naughty list... I figured they would go back that far, there still a lot of these in operation.
Leave a comment:
-
Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly
Originally posted by llonen View PostStupid question perhaps, but I have for some time been planning to deploy linux, will it help with this problem or make no difference since this is a hardware issue.
Spectre is a much longer process to fix.
Leave a comment:
-
Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly
Stupid question perhaps, but I have for some time been planning to deploy linux, will it help with this problem or make no difference since this is a hardware issue.Last edited by llonen; 01-13-2018, 06:29 PM.
Leave a comment:
-
Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly
Originally posted by stj View Post??
the original xbox chip was a 700MHz pentium
Leave a comment:
-
Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly
Originally posted by Stefan Payne View PostNo, its not a fundamental x86 Problem, its a Problem with all CPUs.
Security exploits are ALWAYS a matter of economics -- someone, somewhere, doesn't want to "pay" the price of maintaining the security that has been designed into the system (whether it is a piece of hardware, software or human policies).
People want to be able to get into their homes if they've misplaced their keys so leave a spare "under the mat" -- so they aren't inconvenienced (in that RARE event) or to avoid the cost of calling a locksmith.
Folks want easy to remember passwords so even if you require a 14 character password (to defy rainbow table cracking), they'll pick from a much smaller subset of the 14 character passwords that are potentially available -- cuz "pDiUoETDK9fwJl" is a lot harder to remember than "my name is bob" (both passwords being 14 characters).
Software assumes input from the user will fit in the space set aside by the software developer and saves the cost of limiting the data to that space in the name of saving a few instructions per iteration.
Projecting the access control bits forward through the memory accesses proposed by speculative execution costs more than simply ignoring them and hoping the actual bus cycle that is run is not contrary to their protections. Or, inhibiting the caching of their results (and thus taking the performance hit, there). (some of the fancier ARMs carry this information forward as they speculate)
It doesn't because speculative excecution is inevetable if you want performance.
Its interesting to drag out old software and run it on newer hardware and see how blazingly fast it is! Then, ask yourself what you've "gained" by running the newer (slower) software on that hardware.
Leave a comment:
-
Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly
Originally posted by stj View Post??
the original xbox chip was a 700MHz pentium
https://hackaday.com/2018/01/08/spec...-for-xbox-360/
Leave a comment:
-
Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly
??
the original xbox chip was a 700MHz pentium
Leave a comment:
-
Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly
The original Xbox chip, made by IBM used speculative execution.
Leave a comment:
-
Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly
What the heck are you talking about? Their site is not screwed by some ovelaying menu craps like intels for them mobile craps which I always have to delete away in dragonfly…
Leave a comment:
-
Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly
Originally posted by Topcat View PostFor all the Intel bashers (me included), I just want to remind them all that AMD isn't immune to this either, and isn't the holy grail savior in this mess. Just sayin'. Several of the articles have mentioned that AMD has been less than forthcoming with information for patches, etc. The hypocrisy runs deep.
First off the AMD driver web site design, reminds me of a web site that's ran by radical Euro (or Australia) (or NZ) fascists...Last edited by RJARRRPCGP; 01-13-2018, 09:28 AM.
Leave a comment:
-
Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly
For all the Intel bashers (me included), I just want to remind them all that AMD isn't immune to this either, and isn't the holy grail savior in this mess. Just sayin'. Several of the articles have mentioned that AMD has been less than forthcoming with information for patches, etc. The hypocrisy runs deep.
Leave a comment:
-
Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly
Originally posted by eccerr0r View PostSure but the problem is that now we're finding it's a fundamental problem with x86 (well, superscalar execution), and switching from superscalar to VLIW was a solution.
And that nobody thought about attacking it until now, so no security features to prevent that were implemented - well at Intel at Least, at AMD it seems people thought a bit more but sacrificed performance for that...
Originally posted by eccerr0r View PostDefine nonsense if it solves the problem at hand.
And AFAIR either the last Itanics had something like that or it was planned. So no, id didn't really solve the problem.
As for VLIW: AMD had something like that from the 2000 up to the 6k Series - wasn't that great even in GPUs...Last edited by Stefan Payne; 01-13-2018, 06:45 AM.
Leave a comment:
-
Re: Some serious security bug in INTEL CPUs?? Since Westmere possibly
Intel lied about the maximum TDP of their cpus multiple times since the Pentium 4 and again with the first gen core i7, I've tested and i7 920 that said 130W TDP and it reached more than 200W with prime95, the heat sink that came with it couldn't hold the heat for five minutes. But here people always said that AMD cpus were hotter because of the famous silly Tom's hardware video that removed the heat sink while computer was running, who is so stupid to do that? well Tom's hardware reviewers were. Sure Intel paid god money to do that video.
Leave a comment:
Leave a comment: