Crosstalk vulnerability in Intel processors allows information to be extracted from other cores

Discussion in 'Frontpage news' started by Hilbert Hagedoorn, Jun 11, 2020.

  1. Hilbert Hagedoorn

    Hilbert Hagedoorn Don Vito Corleone Staff Member

    Messages:
    42,886
    Likes Received:
    10,555
    GPU:
    AMD | NVIDIA
  2. k3vst3r

    k3vst3r Ancient Guru

    Messages:
    3,576
    Likes Received:
    103
    GPU:
    KP3090 G9 240Hz
    This affect newer chips like 10900k?
     
  3. Fox2232

    Fox2232 Ancient Guru

    Messages:
    11,809
    Likes Received:
    3,367
    GPU:
    6900XT+AW@240Hz
    Only important thing is performance loss. What @user1 wrote indicates that for certain instructions, loss is up to 97%.
     
  4. asturur

    asturur Maha Guru

    Messages:
    1,166
    Likes Received:
    374
    GPU:
    Geforce Gtx 1080TI
    I wanted to ask here exactly, what are those instructions doing? Because in this case would be better to patch compilers to use them as less as possible.
     

  5. Fox2232

    Fox2232 Ancient Guru

    Messages:
    11,809
    Likes Received:
    3,367
    GPU:
    6900XT+AW@240Hz
    In that case Attacker will likely use his own tooling to maximize potential. When using default tooling will result in 100 times longer data extraction, it is easier to just use pre-patch compiler.
     
  6. Goiur

    Goiur Maha Guru

    Messages:
    1,124
    Likes Received:
    408
    GPU:
    ASUS TUF RTX 3080
    New arq cant come soon enough for intel...
     
  7. Undying

    Undying Ancient Guru

    Messages:
    17,280
    Likes Received:
    6,059
    GPU:
    Aorus RX580 XTR 8GB
  8. Glottiz

    Glottiz Master Guru

    Messages:
    609
    Likes Received:
    200
    GPU:
    TUF 3080 OC
    Who cares. None of these Intel "vulnerabilities" mean anything for end user. I have old intel CPU. Old mobo. No BIOS patches. The only security patches I have is what windows update provided. And guess what? I haven't had any issues, and I don't know anyone else who had.
     
  9. sbacchetta

    sbacchetta Member Guru

    Messages:
    140
    Likes Received:
    66
    GPU:
    GTX 1080ti
    Intel is lucky that their server customer can't just jump to Epyc solution in the snap of a finger...
     
    DeskStar likes this.
  10. k3vst3r

    k3vst3r Ancient Guru

    Messages:
    3,576
    Likes Received:
    103
    GPU:
    KP3090 G9 240Hz
    Believe attacker can access crypto keys on Intel chips? meaning padlock symbol for SSH is useless whilst entering credit card information as one example. Hackers stealing your money no big deal?
     

  11. Fox2232

    Fox2232 Ancient Guru

    Messages:
    11,809
    Likes Received:
    3,367
    GPU:
    6900XT+AW@240Hz
    Nobody will ever tell you story of how his SPI got out. Because they themselves will not know details even in case it was cyber attack.
     
  12. kanenas

    kanenas Master Guru

    Messages:
    329
    Likes Received:
    219
    GPU:
    rtx 2070 ,5700xt
    Tell that to 10 biggest data centers providers on the planet tell that to Oracle, Google,etc, atc even Nvidia now is using Epyc lol next 2 years gone by difficult for Intel at least for cpus.
     
  13. asturur

    asturur Maha Guru

    Messages:
    1,166
    Likes Received:
    374
    GPU:
    Geforce Gtx 1080TI
    This wasn't a solution for security, but for performance. You patch the CPU, but also for performance related application now you avoid those instructions if possible.
     
    Fox2232 likes this.
  14. asturur

    asturur Maha Guru

    Messages:
    1,166
    Likes Received:
    374
    GPU:
    Geforce Gtx 1080TI
    They mean for the end user when they can be exploited by a malicious software to overcome some anti-malicious software or when the patches gets embedded in windows and you loose performance.
    The gamer is obviously looking at that, eventual performance loss that he wasn't planning to have.

    I want to install the window patches as they come, i do not want to invest time in discarding the one that may affect performances.
     
  15. Rich_Guy

    Rich_Guy Ancient Guru

    Messages:
    12,742
    Likes Received:
    724
    GPU:
    MSI 2070S X-Trio

  16. JAMVA

    JAMVA Master Guru

    Messages:
    317
    Likes Received:
    272
    GPU:
    RYZEN 5800X :)
    The Cheese is getting mouldy Intel

    o_O
     
  17. Fender178

    Fender178 Ancient Guru

    Messages:
    4,186
    Likes Received:
    207
    GPU:
    GTX 1070 | GTX 1060
    Well this is not good for Intel. I am glad that I am switching to AMD for my CPU. Well I guess it is safe to assume that CPUs below Broadwell are effected by this as well.
    You are 100% wrong the end user would be the most likely effected group of this vulnerability if they don't know what they are doing.
     
  18. schmidtbag

    schmidtbag Ancient Guru

    Messages:
    6,280
    Likes Received:
    2,603
    GPU:
    HIS R9 290
    Kinda funny when you think about it: Zen2's rdrand was dysfunctional to the point that AMD's fix was basically to disable it. Thanks to security issues, Intel's rdrand is crippled so badly that it might as well be disabled.
    I think we can effectively declare this instruction as obsolete.

    I don't know how many times it needs to be said:
    The entire reason these vulnerabilities are scary is because you can't detect them. You're not supposed to know if they're exploited; that's the whole point.
     
  19. Kool64

    Kool64 Maha Guru

    Messages:
    1,156
    Likes Received:
    462
    GPU:
    Gigabyte RTX2070S
    And they all laughed at me when I said there were more
     
    angelgraves13 and DeskStar like this.
  20. DeskStar

    DeskStar Maha Guru

    Messages:
    1,300
    Likes Received:
    225
    GPU:
    EVGA 3080Ti/3090FTW
    Oh they all are still..... Slowly, but surely.
     

Share This Page