AMD is affected by 2/3 exploits

>AMD is affected by 2/3 exploits
No no no no
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA

Other urls found in this thread:

cnbc.com/2018/01/03/amd-shares-surge-on-report-of-an-intel-chip-security-flaw.html
security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
twitter.com/aionescu/status/948576989622882304
twitter.com/SFWRedditGifs

FUCK INTEL, FUCK AJIT PAI, FUCK DRUMPF, AND FUCK WHITE ""PEOPLE""

*dabs*

>telling lies on the internet

>(((near)))

i'll stick with the big kid brand. by the way, how much is amd's stock worth?

t. bryan

The two of which one has a trivial fix, and the other is unfixable but unlikely

...

AMD isn't affected by Spectre 2, only 1 which already got patched.

>kid brand
Gtfo underage

>2/3
Wait, what? I thought there were only two (Spectre and Meltdown). What's the third?

There are apparantly 2 versions of spectre

Spectre encompasses two exploits, the first two of 3 in the tables of 3 exploits you see. The last one is Meltdown.

spectre has 2 variants

More than yesterday, unlike Intel.

cnbc.com/2018/01/03/amd-shares-surge-on-report-of-an-intel-chip-security-flaw.html

...

Intel is still worth more. Sad

>intel is literally in meltdown
pottery

I see, thanks. Is my understanding below correct?

>Meltdown:
Only affects Intel. Can't be fixed with a microcode update, requires software fixes that can decrease real-world performance by 30%
>Spectre 1 & 2
Affects all x86 CPUs, but can be fixed in software (or was it microcode?) with no performance hit.

t. fake news

>Affects all x86 CPUs, but can be fixed in software (or was it microcode?) with no performance hit.
Correction, affects all RISC CPUs

spectre supposedly can't be fixed but is harder to exploit

So it affects all SPARC, ARM cpus as well as x86 because they're technically RISC under the hood?

yup

One variant of spectre is easily fixed at no significant performance penalty. The second variant is unfixable.

really makes you rub your hands

x86 is cisc tho

So what about RISC specifically makes this vulnerability work?

>big kid brand
So that makes AMD the adult brand then? Fine by me.

ahahah

Nothing. The real problem is out of order execution which provides massive speedups at the cost of security.

>
>>Affects all x86 CPUs, but can be fixed in software (or was it microcode?) with no performance hit.
>Correction, affects all RISC CPUs

But x86 isn't RISC, it's CISC.

security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html

also arm has admitted select arm processors in their lineup are vulnerable to meltdown

not how stocks work, retard

pure CISC CPUs do not exist, x86 has both RISC and CISC component in them.

>It’s worth pointing out that not only does Windows have KPTI/KVA shadowing enabled for AMD processors as well, it even has specialized shadow system call entry stubs for AMD vs Intel. This either suggests they know how to embargo properly or that Tom’s PR is not entirely accurate
twitter.com/aionescu/status/948576989622882304

Because I'm tired of seeing people not know what the fuck is going on, here's a quick explanation of the information available so far:

- Spectre
A class of exploits that attack any modern processor's branching execution pipeline. Modern CPUs can execute multiple "paths" of instructions simultaneously, when the right path depends on the result of a calculation that haven't yet completed. The CPU then discards the results it doesn't need and keeps the ones it does. This general idea is present in every modern processor design, and without it even our highest clocked CPUs would have the performance of some 90s-era piece of shit. But, the machinery that makes it possible is very intricate, and these attacks are meant to twist the way the CPU operates under the hood in ways the designers didn't expect. To completely eliminate this class of attacks will require a redesign of every architecture, to figure out how to prevent side-channel information disclosure from speculative branches. This will likely take years. There is no other workaround. It's possible that these techniques will be used to craft exploits in the wild, but the level of difficulty is probably very high.

- Meltdown
A specific attack that allows non-readable addresses to be read. It works by speculatively reading the memory and then quickly side-channeling it out before an exception occurs. This is easy to exploit (HUGE information leaks, reading disk encryption keys, keyboard input, etc), trivial to reproduce under most conditions, and definitely affects Intel processors. It potentially could affect AMD, but AMD claims that their microarchitecture doesn't allow even speculative reads that violate page protections in this manner. If this is true, it completely kills the vulnerability with no workaround required. The current workaround (KPTI/KAISER) works by unmapping kernel memory from the user address space. This is expensive, and workloads that need to call into the kernel frequently will suffer a lot.

>Microsoft forcing the patch on the AMD even though it's not needed

Why?

paid by the jews, of course.

Now, we wouldn't want AMD to get ahead, would we? L-let's keep the competition fair.

...

Ahem

I know a guy who works at intel. One of the higher ups, works out of santa clara... He's in his 40's, plays alot of a golf and is weird as fuck

according to him, shit is going down.. be ready for shit to hit the fan

implying Intel pajeet know how to read that

and my dad works for Nintendo

more details dawg

tfw not belonging to X86_VENDOR_AMD club...

Ty m8

Jesus, is there anything that isn't at risk?

That old Soviet ternary computer is looking mighty attractive right now.

this but unironically

wait so my computer wont get any faster?

DELETE
THIS

...

>tfw still have a Phenom X4 955 BE
I'm fucked

>not yelling YOLO and adding nopti to boot options.

imho you are going to see a bear dance like a ballerina. The massive company Intel is going to redesign their chips in record time. What this means in the short term to the profits/losses of intc and amd I don't think anybody knows.

Intel is the "big kid" brand, with "kid" being the verb and "big" being the adverb.

You do know why they have to use the term "near-zero", right? RIGHT?!?! Like there's a near-zero change the sun won't rise tomorrow.

>Vulnerability to Variant 2 has not been demonstrated on AMD processors to date
L2R

Nah, unless you using custom Linux kernal + custom bios setting that same as test. you be fine

>AMD claims

And nobody can prove otherwise, unlike the increasingly trivial Intel attack.

>intel implying that a process accessing it's own memory is on-par with a process access all kernel memory on demand

>attack any modern processor's branching execution pipeline
Stop spreading lies, zen is unaffected. Older amd architectures are subject to the attack but software fix is there.
>It potentially could affect AMD
No fucking way, stop spreading lies. You will get an access violation on AMD.