Crosstalk vulnerability in Intel processors allows information to be extracted from other cores

Discussion in 'Frontpage news' started by Hilbert Hagedoorn, Jun 11, 2020.

  1. Hilbert Hagedoorn

    Hilbert Hagedoorn Don Vito Corleone Staff Member

    Messages:
    48,561
    Likes Received:
    18,880
    GPU:
    AMD | NVIDIA
  2. k3vst3r

    k3vst3r Ancient Guru

    Messages:
    3,703
    Likes Received:
    178
    GPU:
    KP3090
    This affect newer chips like 10900k?
     
  3. Fox2232

    Fox2232 Guest

    Messages:
    11,808
    Likes Received:
    3,371
    GPU:
    6900XT+AW@240Hz
    Only important thing is performance loss. What @user1 wrote indicates that for certain instructions, loss is up to 97%.
     
  4. asturur

    asturur Maha Guru

    Messages:
    1,376
    Likes Received:
    503
    GPU:
    Geforce Gtx 1080TI
    I wanted to ask here exactly, what are those instructions doing? Because in this case would be better to patch compilers to use them as less as possible.
     

  5. Fox2232

    Fox2232 Guest

    Messages:
    11,808
    Likes Received:
    3,371
    GPU:
    6900XT+AW@240Hz
    In that case Attacker will likely use his own tooling to maximize potential. When using default tooling will result in 100 times longer data extraction, it is easier to just use pre-patch compiler.
     
  6. Goiur

    Goiur Maha Guru

    Messages:
    1,341
    Likes Received:
    632
    GPU:
    ASUS TUF RTX 4080
    New arq cant come soon enough for intel...
     
  7. Undying

    Undying Ancient Guru

    Messages:
    25,502
    Likes Received:
    12,902
    GPU:
    XFX RX6800XT 16GB
  8. Glottiz

    Glottiz Ancient Guru

    Messages:
    1,953
    Likes Received:
    1,175
    GPU:
    TUF 3080 OC
    Who cares. None of these Intel "vulnerabilities" mean anything for end user. I have old intel CPU. Old mobo. No BIOS patches. The only security patches I have is what windows update provided. And guess what? I haven't had any issues, and I don't know anyone else who had.
     
  9. sbacchetta

    sbacchetta Member Guru

    Messages:
    141
    Likes Received:
    66
    GPU:
    GTX 1080ti
    Intel is lucky that their server customer can't just jump to Epyc solution in the snap of a finger...
     
    DeskStar likes this.
  10. k3vst3r

    k3vst3r Ancient Guru

    Messages:
    3,703
    Likes Received:
    178
    GPU:
    KP3090
    Believe attacker can access crypto keys on Intel chips? meaning padlock symbol for SSH is useless whilst entering credit card information as one example. Hackers stealing your money no big deal?
     

  11. Fox2232

    Fox2232 Guest

    Messages:
    11,808
    Likes Received:
    3,371
    GPU:
    6900XT+AW@240Hz
    Nobody will ever tell you story of how his SPI got out. Because they themselves will not know details even in case it was cyber attack.
     
  12. kanenas

    kanenas Master Guru

    Messages:
    512
    Likes Received:
    385
    GPU:
    6900xt,7800xt.
    Tell that to 10 biggest data centers providers on the planet tell that to Oracle, Google,etc, atc even Nvidia now is using Epyc lol next 2 years gone by difficult for Intel at least for cpus.
     
  13. asturur

    asturur Maha Guru

    Messages:
    1,376
    Likes Received:
    503
    GPU:
    Geforce Gtx 1080TI
    This wasn't a solution for security, but for performance. You patch the CPU, but also for performance related application now you avoid those instructions if possible.
     
    Fox2232 likes this.
  14. asturur

    asturur Maha Guru

    Messages:
    1,376
    Likes Received:
    503
    GPU:
    Geforce Gtx 1080TI
    They mean for the end user when they can be exploited by a malicious software to overcome some anti-malicious software or when the patches gets embedded in windows and you loose performance.
    The gamer is obviously looking at that, eventual performance loss that he wasn't planning to have.

    I want to install the window patches as they come, i do not want to invest time in discarding the one that may affect performances.
     
  15. Rich_Guy

    Rich_Guy Ancient Guru

    Messages:
    13,146
    Likes Received:
    1,096
    GPU:
    MSI 2070S X-Trio

  16. JAMVA

    JAMVA Master Guru

    Messages:
    556
    Likes Received:
    604
    GPU:
    MSI Gaming X 4080:)
    The Cheese is getting mouldy Intel

    o_O
     
  17. Fender178

    Fender178 Ancient Guru

    Messages:
    4,194
    Likes Received:
    213
    GPU:
    GTX 1070 | GTX 1060
    Well this is not good for Intel. I am glad that I am switching to AMD for my CPU. Well I guess it is safe to assume that CPUs below Broadwell are effected by this as well.
    You are 100% wrong the end user would be the most likely effected group of this vulnerability if they don't know what they are doing.
     
  18. schmidtbag

    schmidtbag Ancient Guru

    Messages:
    8,023
    Likes Received:
    4,400
    GPU:
    Asrock 7700XT
    Kinda funny when you think about it: Zen2's rdrand was dysfunctional to the point that AMD's fix was basically to disable it. Thanks to security issues, Intel's rdrand is crippled so badly that it might as well be disabled.
    I think we can effectively declare this instruction as obsolete.

    I don't know how many times it needs to be said:
    The entire reason these vulnerabilities are scary is because you can't detect them. You're not supposed to know if they're exploited; that's the whole point.
     
  19. Kool64

    Kool64 Ancient Guru

    Messages:
    1,662
    Likes Received:
    790
    GPU:
    Gigabyte 4070
    And they all laughed at me when I said there were more
     
    angelgraves13 and DeskStar like this.
  20. DeskStar

    DeskStar Guest

    Messages:
    1,307
    Likes Received:
    229
    GPU:
    EVGA 3080Ti/3090FTW
    Oh they all are still..... Slowly, but surely.
     

Share This Page