• Competitor rules

    Please remember that any mention of competitors, hinting at competitors or offering to provide details of competitors will result in an account suspension. The full rules can be found under the 'Terms and Rules' link in the bottom right corner of your screen. Just don't mention competitors in any way, shape or form and you'll be OK.

Intel bug incoming? Meltdown and Spectre exploits

This raises a couple of questions:
  1. What Anti-virus products will work correctly following Microsoft's "fix".
  2. What "unsupported calls into Windows kernel memory" have these programs been making and why? Have they known about this bug for longer than Google?

1. Microsoft's patch won't be applied unless the AV used is compatible.
2. This sort of thing has been done by various applications for decades on lots of different platforms; essentially, programs ought to use APIs to access functions provided by the operating system, but sometimes a developer chooses not to do so either because the API doesn't exist, or they want to bypass some restriction imposed by it (which could be functional or performance related). I'd expect lots of AV programs to skirt this grey area because of their nature.
 
It would be good is someone can find (or do) some benchmarks on AMD processors after the Windows patch. We know that an 'unpatch' was applied to Linux to exempt them from the workaround. But I don't think we've had confirmation that MS didn't apply the original patch to simply workaround all CPU's regardless of vendor?

As it happens i did a Cinebench run last night and then downloaded and installed the Microsoft patch tonight. As you can see it made no difference at all.

nytwra.jpg
 
Just saw an article - mobile phones vunerable too http://www.independent.co.uk/life-s...artphone-cyber-security-hacking-a8141746.html

My phone is Kirin 955 CPU (ARMv8-A instruction set) - unlikley to get an update - is my phone now basicaly junk?

The author of that article may have been bamboozled by Intel's PR statement - not sure if they are aware of the following:
- There are two separate vulnerabilities - Meltdown and Spectre
- The "Intel chip flaw" has nothing to do with millions of Android devices, as they don't have Intel x86 CPUs (yes, there are some x86 tablets, but they are a tiny minority).
- Only Arm's Cortex A75 is subject to Meltdown, and many Android devices use other variants.

Spectre is the main issue for most Android devices though, and this is also addressed through software updates - so the article is correct in this statement: "a significant proportion of Android smartphones and tablets made by the likes of Samsung and LG are – and will always be – stuck on older, unsupported versions of the operating system, and could therefore remain at risk". However, there are already many other vulnerabilities that require software updates to be applied, and this risk is an old point of contention!
 
Why, you know it's going to be **** anyway. It was 157 last night....................happy now ?

Funnily enough mines just slightly faster than the 4.3ghz 4770k I replaced.. so I gained slightly in single threaded and absolutely smashed it in Multithreaded

Ignore Gavin he's just trolling you ;)
 
Am I right in saying the Qualcomm Snapdragon 615 CPU in my phone which is an ARM Cortex A53 won't be affected?

I think I read in one of the many links within this thread that just one ARM CPU is affected.
 
The numbers I first saw were those ones that show a consistent 5% drop in game performance, however it's on an older cpu. THough considering the number of people on older Intel hardware then that's still a fairly hefty hit to a lot of gamers. Will be interesting to see 5820k numbers seeing as that's what I have.

Am I right in saying the Qualcomm Snapdragon 615 CPU in my phone which is an ARM Cortex A53 won't be affected?

I think I read in one of the many links within this thread that just one ARM CPU is affected.


https://developer.arm.com/support/security-update

A53 not affected, their midrange type chips are aimed at efficiency and are all(I believe) in order cores and it's out of order execution and the associated branch prediction causing all the problems. It's basically all of their out of order cores that are vulnerable to spectre but only their most recent core is fully vulnerable to meltdown, though two other cores apparently are vulnerable to a specific type of variant 3 attack they are calling variant 3a.

Assuming their next core builds upon the A75 then I can certainly see issues in the near future with next gen phones being delayed/using different chips, which would basically just make them refreshes of existing phones.
 
People are talking about maybe getting a refund for Intel CPUs under UK consumer laws regarding defective or faulty goods. The consumer protection lasts for 6 years from the date of purchase. Will be interesting to see if this actually happens.

What are peoples thoughts on this? More to the point has OCUK considered this?
 
It's definitely a design defect, but I'm sure Intel will claim that's not a manufacturing defect. The chips have been manufactured exactly as intended. That kind of thing always seems to gain more traction in the States than over here (just look at the VAG settlements).
 
Probably the only ones who are entitled to take action against Intel are a few data centers since performance in some data center specific applications is indeed lower, but the average person on this forum probably doesn't have any grounds for it. The kernel patches should mitigate meltdown, and supposedly further firmware/kernel updates will mitigate the other 2 variants (which apparent affect all known CPUs).
 
I'm not going to bother installing the "fix". The chances someone is going to use it to hack my gaming machine is pretty remote.
 
The fix has negligible performance impact on Intel and AMD isn't affected at all, not sure why you wouldn't install it. Better safe than sorry since it's a pretty big security issue.
 
Back
Top Bottom