>CVE-2018-3615: This affects Software Guard Extensions (SGX), and was discovered by various academics who will reveal their findings this week at the Usenix Security Symposium. According to Intel, "systems with microprocessors utilizing speculative execution and software guard extensions (Intel SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via side-channel analysis."
>CVE-2018-3620: This affects operating systems and SMM. According to Intel, "systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and side-channel analysis."
>CVE-2018-3646: This affects hypervisors and virtual machines. According to Intel, "systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and side-channel analysis."
But they are affected you dumbass. A number of these vulnerabilities exist only due to Intel cutting corners to increase performance. Once these are fixed the performance naturally degrades in most applications, including video games.
Connor Gonzalez
SGX is DRM. It allows creation of encrypted memory areas that can't be inspected.
This reminded me to the time I had a discussion about reccomending Intel CPU's to "The absolute hardcore 2345fps CSGO on low settings" gamer and I said Intel isn't worth getting because of all security issues and possible future patches that will affect these CPU's. Here we are and Intel might kill gaming performance, the last area where ryzen is not besting intel, due to their own stupidity.
And wasn't there some sec guy who envisioned intel needing to disable HT to come close to fixing security issues?
Charles Jenkins
Thanks
Alexander Green
m-muh sekrit sauce
Daniel Nguyen
do people still think these are "loopholes" and gaps that no one knew of? Do people think the largest processor producer in the world that's heavily tied to the US and Israeli governments isn't doing this shit intentionally?
>do people still think these are "loopholes" and gaps that no one knew of?
Of course not, everyone knows that all these Intel vulnerabilities are kept under embargo for months. Hell it seems that even a shitty Linux news site had access to this info before open source OS projects.
Is AMD actually safer or are there just less people searching for vulnerabilities in AMD chips?
James Williams
SGX being used as a backdoor for malware? No way that could have happen! Oh wait.......
Josiah Smith
It is more like design oversights. CPU architects typically aren't deeply interested in security and majority of crackers/black hats have been going after the more low-hanging fruit.
The only reason these CPU-level exploits are being discovered is because gray/white-hats have pretty much exhausted all of the low-hanging fruit and move into the high-hanging stuff.
David Peterson
It's significantly safer. Although it does share a few vulnerabilities related to x86 architecture.
Luis Cooper
Hardware-level DRM pushed by parties that are computer and digital security illiterate.
What CPUs are they implmenting the SGX on? The current intel CPUs are fine to buy right?
Nathaniel Foster
>And wasn't there some sec guy who envisioned intel needing to disable HT to come close to fixing security issues? Don't worry, they're already doing it themselves on the next i7 line l o l
Bentley King
Kaby Lake and Coffee Lake are the only silicon that have it right now
It is possible that they might implement it on Cascade Lake.
Jason Perez
Imagine the the amount of yet untold vulnerabililties
Isaac Price
delid
John Miller
YOU GOT TO BE FUCKING KIDDING ME
Seriously wtf!! UGH I just fuck bought a fucking new Xeon. I really hate you Jow Forums fucking always shitting on intel as if this makes me feel any better I really can't escape you fucking freetards.
Bentley Gonzalez
Then its fine I'm planning to get the 7980XE
Oliver Campbell
Life is suffering.
Zachary Baker
Actually, this might do some good because if I'm not mistaken, the security of UHD Blurays and 4K Netflix relies on SGX.
Jacob Martin
What processor do we use now?
Matthew Foster
why would you buy a fucking xeon in 2018?
Zachary Clark
>tfw sitting comfily on oc'd haswell too bad I'll have to buy amd compatibile mobo when upgrading
Liam Nelson
>On a side note, AMD cpus are not vulnerable to this problem. Currently it is believed their address translation layer works according to spec.
Looks like I was right to wait for Zen
Parker Richardson
cat /proc/cpuinfo | grep bugs
Kayden Robinson
>design ((( """ oversights """ )))
Gabriel Martinez
> ((( """ oversights """ )))
Luis Baker
Pls don't
Chase Scott
Holy fucking shit will you get a life? Every single fucking day you post the exact same shit here.
IIRC OpenBSD totally disabled hyperthreading to get ahead of this.
Landon Miller
grsecurity is not meaningfully open source and probably violates the gpl2.
Nicholas Morales
They did. The security community wasn't telling them anything but they looked at the patches that were coming in on other systems and determined that there was a problem with SMT and disabled it to be safe.
Michael Butler
This
Adam Miller
Intel has still remained much faster in csgo with all the patches applied so far. >but surely this time amd will win They won't
Chase Murphy
How does /proc have information about vulnerability? An update of system write it?
Thomas Ramirez
>Megacorporation implements feature that doesn't favor the consumer
>Intel will release the next-generation Intel Xeon Scalable processors (code-named Cascade Lake) with silicon level mitigations for not just Spectre and Meltdown but for L1TF .
>Dump the flags which denote we have detected and/or have applied bug workarounds to the CPU we're executing on, in a similar manner to the feature flags. >The advantage is that those are not accumulating over time like the CPU features.
Kiddo, CPU architectures haven't changed that much since the 1990s. At the time, where most of the groundwork for modern CPU designs was being laid out. Security wasn't really that much of a focus and these "new" attack vectors were unthinkable at the time.
These "flaws" were only discovered by security geeks who had way too much time on their hands and got bored with finding network-level and software-level exploitations.
Elijah Reed
Those who trade security for speed deserve neither and lose both.
Hunter Sullivan
>seething kike There's 30 year old research pointing out the dangers of speculative execution.
>have core 2 duo from 2007 >literally not affected, again
lmfao richtards are really regretting their $1000 paperweight investments now huh?
Aaron Gomez
>Buying a slow, expensive housefire
Jeremiah Richardson
>buying obsolete Intel garbage 2950X or bust
Carson Martinez
Mad?
Jeremiah Wright
You act like end users ever update their systems. (they dont)
Joshua Reyes
Confused as to why this is your life. You know you only get one of these things, right? And here you are having already spent a good percentage of it railing against a multibillion dollar American semiconductor manufacturer for manufacturing useful semiconductors and selling them at a price their customers are willing to spend. So you're her typing away and having your message bounced around on thousands of servers using Intel microprocessors, complaining about Intel because for some reason you've internalized a hatred for Jews based on a 1500 year old far left Christian stupidity regarding the charging of interest rates which you've transferred to Intel simply because they have a research center in Israel.
Asher Scott
There are a lot of underage retards unironically shitposting lately
Angel Kelly
Again, the CPU industry wasn't paying that much attention to it until recently. They were much more focused on more pragmatic concerns (memory limitations, transistor budget, performance) then potential security exploitations due to design choices.
You vastly underestimate the power of group-think and out of context problems.
Grayson Jackson
>rubbing palms behind you >heh nothing personal Kiddo
Julian Taylor
>had way too much time on their hands and got bored Oy vey! how dare this goy not participate in the rat race
Chase Rodriguez
>American semiconductor Yeah sure (((boy)))
Jeremiah Green
Did you not know that America actually exists? My uncle works at Honeywell in Arizona, right next to the Intel fab there.
Carter Reyes
You guys have been arguing this for literally over a decade
Daniel James
>create cpu feature focused on security >turns out said feature is, itself, insecure 99 keks
Jonathan Phillips
I don't want to say jews did this but jews did this
>person on the same computer can access data on the same computer.
Quick disable your processor! It's the only way!
Ryder Campbell
buying a xeon in 2018 when you could buy TR1 or 2 you deserve everything bad happening to you
Cooper Ramirez
user, you do realize that we use multi-user operating systems with access control lists and such, right?
Oh right you’re a Jew. Nevermind.
Liam Gonzalez
Are they vulnerabilities or built in backdoors being discovered because Intel fucked up? Seems odd all these """vulnerabilities""" are only on Intel and only Intel has evidence of working directly with intelligence agencies to fuck everyone up.
Eli Barnes
Some of spectre shit works on Zen too but it's far easier to fix, even if the architecture is not flawless is still way more solid