INTEL IS FINISHED

INTEL IS FINISHED

theregister.co.uk/2018/01/02/intel_cpu_design_flaw/

Other urls found in this thread:

lkml.org/lkml/2018/1/2/703
youtube.com/watch?v=ThItRZqFKX4
twitter.com/NSFWRedditVideo

AMD guy myself, but all I see is intel gaining 30% more performance in some cases in future

>Another exploit that requires 90 other layers of incredibly specific access that makes the exploit moot in the first place
Ah yes, if the attacker has physical access to my box with root access and I'm running this particular build of the OS with this specific patch missing and this specific build of Adobe Acrobat installed, it's all over!

>if true
>olly place reporting is a tech opinion website from the uk
I have a hard time beleiving this. When you google it the first result is reddit using Sup Forums as a source. Hoax?

Wat?

>incredibly specific access
Yes. Such as running javascript in your browser.
Or deploying a docker container to the same physical machine as your container is running on.

"that intel bug is definitely sweating a bunch of people i know who work in ops

basically there is an issue with intel CPUs and VRAM that leads to protected pages of memory becoming accessible in userspace. it's both a HUGE security issue and something that is so fundamental to OSes that requires a massive rework of the VRAM systems on all the OSes. the patch that will need to go in is apparently so significant that it'll cause a 5-30% performance drop on Linux."

Yeah i read that. What i am curious of is its legitimacy. Some unknown tech site, Sup Forums, and reddit doesnt inspire confidence. Sup Forums is overrun with amd shills so i trust this place the least

Apart from it can be exploited by javascript and it's serious enough they're giving everyone a 5-30% performance penalty solely in order to address this issue.

>theregister
>unknown tech site

>I have a hard time beleiving this.
Of course you do, little Intel fanboi.

its over, amd won

...

IT'S NOT A BUG GOYIM

IT'S A FEATURE

Screenshotted to laugh at you later when its confirmed a hoax

Is that where bongs get their tech news?

Will this effect my CPU?

I've got Intel Core i3-4005U and its x64 based.

Yes, all Core i3 models are affected.

Every intel CPU made in the past 10 years is what I read...I think

Nigga you retarded

Better sell some more stock, Brian.

Okay keep pretending then

Fuck. I give up with Intel, I'm just going to sell this laptop and buy something else. Can anybody recommend a good cheap laptop that I could buy which wouldn't be affected by this? Preferably available in the UK

Lenovo Thinkpad A470.

Just don't install Ubuntu 17.10 on it.

You shouldn't install Ubuntu in the first place.

First page of Google brings up a shit load of replacement screens and one laptop for over 800 USD, hardly cheap lol. I only want it for YouTube and Facebook so doesn't need to be anything special but just not fucked by this bug

u r right, u should use gentoo

NOOOOOOO! IT ISN'T TRUE! THIS IS AN AMD PLOT!

Get a core 2 duo macbook, later models. Those are just fine for YT/FB and shouldn't be affected.

This is fake af.
If im wrong show some proofs

>shouldn't
Not very reassuring lol

I don't understand why a list of affected and unaffected CPUs hasn't been compiled yet, the register says winblows is going to release a fix next week so I might try it and see how badly processes get slowed down, although I rarely seem to receive any updates on 8.1

In that case buy a mid-2009 Macbook. Can find one on Amazon for like $105 max, and they're not affected by this bug. Can upgrade to El Capitan, too.

>core 2 duo
most recent comments on the various forums seem to indicate that everything from Core and up is affected, so all processors from 2006 and onwards.

Intel has embargoed flaw details. What we know comes almost entirely from people actually installing the patch and testing, or from trying to decipher the patch source code.

lkml.org/lkml/2018/1/2/703

The "Intel Core" series does not include the original Core Solo/Duo and Core 2 Solo/Duo/Quad as a marketing umbrella. I've not seen anything that *confirms* that pre-Nehalem is affected, although it's been speculated that processors as old as the Pentium II might be.

Sup Forums was right about 90s thinkpads all along....

Appreciate it :3

...

Fuck it man, if Pentium Pros are vulnerable to this too then the ONLY solution will be going back to PowerPC Macbooks.

or you can just buy AMD like a normal person

So fucking close to making a prophecy. Damnit

>I give up with Intel

So the fuck what?
It's not like you were on their team or someshit, you happen to own a computer with a CPU they made.

Quite acting like anything you do is relevant enough that someone would want to hack you anyways.

Well, yeah. Here's to hoping Lenovo drops an A1 Carbon with a touch screen.

Suck my gooch you Intel shillbot

You should go back to your Ipad like the retarded faggot you are. You're so dumb you don't need to worry about anything tech related.

>Wat
How long before intel fixes the bug and releases a patch?

I've seen some people speculate this affects all processors back to Pentium Pro. It's not just "Core" processors, its everything with ME

why are you so insecure

Intel is full of diversity and engineering has led by a pajeet for years. Need I say more?

Should I install genpoo daddi?

He's an Intel processor

Why are you so fucking dumb? Which one of your ancestors fucked their sister to result in a dumb fuck like you?

>google Ryan Shrout
>known amd shill

going all out

...

i dont know a shit about computers but it seems that linux and windows are patching, if what i read is correct

The patch IS what causes the 30% drop in performance. Not having the patch leaves your system wide open to total compromization.

It's Virtmem that matters here, not ME, although ME is itself cancerous.

AYYYY

The patch reduces performance by X%. The flaw (not a bug, it's an actual design flaw) is in the hardware of the processors and cannot be ultimately fixed by software patches.

why are intels cpus so fucking insecure all of the sudden

Thanks for the clarification!!

NOOOOOOOOOOOOOOOOOO

Intel has been doing mostly the same shit over the past 9 years so even rather old research into Intel's security still applies to newer CPUs, It's just now starting to catch up

does this affect my shitty dial core from 2014?

They always were and anyone with a brain knew it. Intel has been exercising abysmal business practices since the Pentium 3. What makes you think their vicious cost cutting, relentless gas lighting and anti-competitive bribery/coercion was actually sitting on top of a well designed product?

So, now what?
As an average home user faggot, do I need to buy a new AMD processor and replace my i7? Or download the patch and take a performance hit?
Or or just do nothing and carry on as usual because this is mostly a concern for large businesses and I know I can trust the handful of pages I visit on a daily basis to not implement a script which can fuck me over?

...

it is a 1 core now performance wise my friend, welcome back to 2003

>2014
yep. Everything back to Nehalem and possibly farther.

You're better off patching and keeping up to date.

Read the thread this could effect all intel CPUs all the way back to the 90s

You're going to get compromised. Just take the hit or buy a Ryzen.

Lets put it in a simpler way to stop people from constantly asking this, if you managed to get to Sup Forums on an intel based system, yes its highly likely it will affect you.

Once the details of the vulnerability are released the potential attackers will learn about it. And if it's really Level 3 to Level 0 vulnerability it will mean that you can get fucked up by running Javascript on your browser

and it'll be completely patched by tuesday. it's an OS issue

windows will have an update that will give you ~5% less performance

Its not an OS issue, the OS patch is a crude workaround, hence the potentially huge performance impact.

5%-65% less performance. Fixed.

...

if you have an x86 processor, it'll be 5%

>tfw almost fell for the intel meme entirely
cheaped out with a dual core with a possible future upgrade in mind.
still havent upgraded. at least now i can ditch it and build new system.

Good thing I shitpost with an 80186

Source: Your ass.

Thomas Gleixner (25):
x86/cpufeatures: Add X86_BUG_CPU_INSECURE
x86/mm/pti: Add infrastructure for page table isolation
x86/mm/pti: Force entry through trampoline when PTI active
x86/entry: Align entry text section to PMD boundary
x86/mm/pti: Share entry text PMD
x86/cpu_entry_area: Add debugstore entries to cpu_entry_area
x86/mm/dump_pagetables: Check user space page table for WX pages
x86/mm/dump_pagetables: Allow dumping current pagetables
x86/ldt: Make the LDT mapping RO
perf/x86/intel: Plug memory leak in intel_pmu_init()
x86/apic: Switch all APICs to Fixed delivery mode
gpio: brcmstb: Make really use of the new lockdep class
genirq/msi: Handle reactivation only on success
genirq: Introduce IRQD_CAN_RESERVE flag
x86/vector: Use IRQD_CAN_RESERVE flag
genirq/irqdomain: Rename early argument of irq_domain_activate_irq()
genirq/msi, x86/vector: Prevent reservation mode for non maskable MSI
timers: Reinitialize per cpu bases on hotplug
nohz: Prevent a timer interrupt storm in tick_nohz_stop_sched_tick()
timers: Invoke timer_start_debug() where it makes sense
timerqueue: Document return values of timerqueue_add/del()
x86/smpboot: Remove stale TLB flush invocations
x86/mm: Remove preempt_disable/enable() from __native_flush_tlb()
x86/ldt: Plug memory leak in error path
x86/ldt: Make LDT pgtable free conditional

I sure hope the update can be downloaded and installed as standalone because I haven't updated Windows in years.

You can bet nsa/cia are aware of it and have been using malware that exploits this particular bug.
In fact intel probably told them about it (if it wasnt there intentionally in the first place)
Amd probably leaked to public/ linux devs.


Kek so we will be seeing 30% performance hit. Does it mean intel is now equal to Amd?

Ok, so microshit will release fix on that next week, and this 30% performance impact is a bullshit. It will mostly affect io operations, such as disk access... but still not -30%.
Good news to gaymers - you will not see any difference in gaymes. So you might want to fuck off already to .
Also saging and hidding this shit thread. AyyMD drones - please get back to sleep.

Can't you manually update your drivers?

You're already compromised

>not using IBM Power Solutions or Oracle Sparc Solutions
>2018
>using Intel or AMD

What did I just read

Here tard, this one is safe
youtube.com/watch?v=ThItRZqFKX4

It won't affect games? Are GPUs not controlled through syscalls?

>Good news to gaymers - you will not see any difference in gaymes
Whut. dGPU drivers are pure syscalls.

>you will not see any difference in gaymes
What a baka.

It won't be. It'll have the same risk as a local escalation vulnerability, meaning you need local user rights first to escalate this (so not something a browser could use, but software the user runs could).

>AyyMD drones - please get back to sleep.
okay I'll be over here sleeping while you rush out a patch for a bug in every CPU intel built for a decade

>Does it mean intel is now equal to Amd?
Intel is now *significantly* below AMD.

Main rig: i7-4790k
Weekend rig: i3-2120

How fucked am I? Or will I be fine because they are too old and not effected?

This is fucking HUGE

100% fucked on both. No joke.