So a HUGE security flaw in Intel CPUs dating back as far as the 1st Generation Core i series (think i7-920, i3-550 etc., nahalem, westmere), could mean that hackers could gain access to (they won't be able to as soon as this is patched in the next week, via a kernal page table isolation update) privileged information via a security check exploit where apparently (we won't find out 100% until Jan 9th) the Intel core i and associated xeon chips were made with performance gains in mind at the expensive of security. This is said that once it's patched it could spell performance hits from anywhere from 5% to 30%, though users with the patched Linux systems have reported drops of even more than the 30%, though gamer's and main rig productivity users seem to be unaffected.
*Edit this is one of three variants identified as Meltdown, I will cover the other two in another video, will also test performance numbers for you guys.
AMD CPUs on the other hand are supposedly not affected one bit (all pun intended) by this security flaw in the OS Kernel.
Also in this video I explain as best I can what is going on and what in basic function the kernel in the operating system does.
And to further complicate things the CEO of Intel has apparently sold off as much stock as possible. So who knows what will go on from here, but looks like some more 'interesting' times ahead.
Links to articles used (there are a heap of good reads here:)
Benchmarks from Phoronix: https://www.phoronix.com/scan.php?page=article&item=linux-415-x86pti&num=2
Hot Hardware Article: https://hothardware.com/news/intel-cpu-bug-kernel-memory-isolation-linux-windows-macos
PostGresQL Article: https://email@example.com
Python Article: http://pythonsweetness.tumblr.com/post/169166980422/the-mysterious-case-of-the-linux-page-table
Extreme Tech Article: https://www.extremetech.com/computing/261364-massive-intel-cpu-bug-leaves-kernel-vulnerable-reduce-performance
Page Table Info: https://en.wikipedia.org/wiki/Page_table
Investor holdings from fool.com: https://www.fool.com/investing/2017/12/19/intels-ceo-just-sold-a-lot-of-stock.aspx
The Register: https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/
The Verge: https://www.theverge.com/2018/1/3/16844630/intel-processor-security-flaw-bug-kernel-windows-linux
Reuters Article: https://in.reuters.com/article/cyber-intel/security-flaws-put-virtually-all-phones-computers-at-risk-idINKBN1ES1BM
Itwire article: https://www.itwire.com/security/81321-fixes-rushed-out-for-intel-cpu-bug-as-embargo-collapses.html
Institutional Investors Intel: http://www.nasdaq.com/symbol/intc/institutional-holdings
Institutional Investors AMD: http://www.nasdaq.com/symbol/amd/institutional-holdings
Intel Lawsuit: http://archive.fortune.com/magazines/fortune/fortune_archive/2006/08/21/8383598/index.htm
Twitter Link for Brainsmoke: https://twitter.com/brainsmoke/status/948561799875502080
Tweaktown Article used: https://www.tweaktown.com/news/59584/asus-z270-platform-work-coffee-lake-cpus/index.html
For a $1 a month you can help support the channel directly & gain access to an uncut special monthly live: http://www.patreon.com/techyescity
Join our Forums for Discussion:
Stay up to date with the latest updates here:
Twitter - www.twitter.com/techyescity
Instagram - www.instagram.com/techyescity
Facebook - www.facebook.com/techyescity
Google Plus - https://goo.gl/QdZmQF
Check out my Video Editing PC Here - http://amzn.to/2oFKlrb
Music Provided by either: monstercat, chukibeats, epidemicsound, vlognocopyright or bassrebels
Microsoft's patch also caused Intel® Pentium® Processor G3258 to bluescreen, just like the AMD processors.
Was working on a Windows 7 PC that was rebooting after 2 minutes of uptime, that had this processor and it had received this update. So went back to a system restore and installed the updates that were applied one by one and discovered this patch KB4056894 was causing the problem.
So it is not just AMD processors!!!
potential to destroy Intel... maybe bring down cpu prices. since many people are going to be weary of the flaws. i know my next CPU won't be from intel. granted my next cpu upgrade is like 5 years from now when the new cpu won't have the flaw anymore.
Maybe I'm just not cynical enough (and that's a suggestion that would make anyone who knows me burst out laughing) but I really think this security flaw was a sloppy oversight from Intel, rather than a corner deliberately cut for fast bucks. I say sloppy, but this kind of kernel-level accessing is pretty arcane stuff. Hey, it's taken 10 years for experts in the field to notice it.
Also, other chip manufacturers have been implementing similar speculative execution functionality in as similar a way as they can get away with and their products aren't completely immune either. Moreover, if this has been a way for other manufacturers to stick a knife into Intel for 10 years, why has the knife stayed sheathed until now? And why did the others also have to take time to analyse the problem and release research and patches themselves? They reverse engineer and analyse each others products all the time.
Nope, I reckon the others just got lucky (or rather luckier).
And if it's any comfort to some, if your processor is from 2015 onwards, you have some mitigation via PCID.
Practical upshot? Panic, of course. But a lot of the kind of users that really care about whipfast performance will have upgraded their hardware recently and not be so badly affected. The vast majority of others will be affected more badly, but are less likely to be performing the kind of tasks that will take bigger hits. They're also not really likely to even notice if eg their Powerpoint presentation is a bit more sluggish to load.
The server market is another question. Reputation will be an issue certainly. But big data companies aren't suddenly going to go out and spend a packet on replacing tens of thousands of units. They'll do what the users will do - install patches, keep a close eye on developments and upgrade hardware as and when. It'll take a while, but server farms swap out old or faulty units every day. They'll probably junk a load of inventory though - and Intel will be forced to cut a deal on new hardware for a while.
Litigation will be a pain for Intel too, but actual negligence will be hard to prove and it's very difficult to sue for injury that could have occurred but didn't. That could change of course, if any proof comes to light that the weakness has actually been exploited.
I personally think that's unlikely - contrary to popular myth, hackers don't tend to be geniuses. They're more likely to clumsily pretend to be your mum than hack you at a kernel level. They also specialise in payloads, not delivery - most malware contains large chunks of "off the shelf" code. Also, how likely is it that criminals, who are invariably of the smash and grab mindset, have had the discipline to exploit this hole for 10 years without flagging it up?
The new battle lines between good and bad guys have been drawn over Spectre though...
And I can see a surge in activity from auto-password software ("vault" style stuff) to regularly rotate passwords. On the subject of which, as yet, this kind of info hacking has to be done on a bit-by-bit basis and requires the use of timed conditional loops. In practice, it's quite slow. And a lot of sensitive servers time out. So it's more important than ever to have passwords that are great big long complex monsters.
I'm not advocating complacency here people, just being realistic.
This should be rolling heads, but it won't. As you have so smartly pointed out in this video, this made INTC investors a lot of money. The consumers got screwed... This is similar to the Volkswagen emissions scandal...
AMD is not affected by INTEL Flaw and this is why!
" Quote AMD">>To be clear, the security research team identified three variants targeting speculative execution. The threat and the response to the three variants differ by microprocessor company, and AMD is not susceptible to all three variants. Due to differences in AMD's architecture, we believe there is a near zero risk to AMD processors at this time.
AMD processors are not subject to the types of attacks that the kernel page table isolation feature protects against,” Intel does not, seems they eliminated it to get more speed out of their chips.
The AMD microarchitecture does not allow memory references, including speculative references, that access higher privileged data when running in a lesser privileged mode when that access would result in a page fault.”
In this case, the issue reportedly has to do with an exploitable security flaw in the way that the kernel of the Microsoft Windows operating system interacts with Intel processors.
A hacker could, hypothetically, take advantage of this undesirable interaction to bypass normal security measures.
Microsoft's proposed fix could result in performance drops as high as 30% in PCs that run on Intel chips that were released as long as 10 years ago.
The drop-in performance could lead to "huge slowdowns in typical workloads, “according to the Python Sweetness developer blog. This will most likely affect Data Centers the most, and it has been said that it will not affect gaming, But the truth is no one knows for sure, since each application and game is coded differently if the game or application uses virtual memory it could be impacted greatly, most likely some programs and games will be affected and others will not. The fix requires a recode in how kernels and processors interact.
The solution (Patch or Fix) requires processors to do more work in terms of security and isolating bits of the kernel, meaning a likely hit to performance.
Additional overhead is introduced to maintain a barrier between memory address spaces, which can result in a performance handicap of 30 percent or more. Depending on you system and applications.
The biggest problem is the companies that have virtualized environments, which is a lot of big name companies. They will see the performance hit the most.
AMD processors aren't affected by the bug due to security protections that the company has in place.
This also means that AMD processors shouldn't be affected by any performance hits.
AMD"s latest EPYC data center server chips and Ryzen Pro enterprise desktop CPUs have Secure Memory Encryption technology on board, for additional protection against just these sorts of threat vectors.
The problem with the INTEL software fix is in its self is a vulnerability. It is simply a band aid, to fix the problem short term. Since the problem is mostly hardware based, And Band Aids can be hacked too, and now the hackers know where to focus their efforts.
The only real way for Intel to fix the issue is a total new hardware architecture, the problem is with that its it can take years to develop.
This means even with the software temporary Band aid; Intel processors will still be venerable since sooner or later the band aid will be hacked too.
Due to this problem I think we will be seeing many businesses move their server operations to AMD Epic over the next 24 to 36 months, they do not have the time to wait years for a new INTEL architecture to be developed. Their liability is here and now, and I am sure they are not willing to put their companies on the line with possible lawsuits due to this flaw that could have their customers personal data stolen. They simply will not take the chance. Also in the long term as far as INTEL reputation and trust have been tarnished with everyone, since they knew about this problem for a decade, and chose to cover it up, and from an outsider looking in view point the motivation seems to be greed, removing security features to obtain more speed out of their chips to enable them to justifying charging more for their product. This will now come back to haunt them. Now once the patch in place some people and systems will run much slower, and with a chip they paid much more for! I am sure this will result in many law suites, and could down the road devastate Intel as a company.
Neither Meltdown nor Spectre are the biggest problems guys! The problems are the soon COMING heavier vulnerabilities which aren´t announced yet for obvious reasons!People say about 10-12 "Meltdown"-similar vulnerabilities will be announced in the coming 6 months!
SO THE BIGGEST INTEL SHILLS LIKE LINUS & JAYS2CENTS ARE GOING TO REMAIN SILENT ABOUT THIS ? I'M HOPING A CERTAIN REVIEWER (BRIAN) WILL STOP DELIDDING INTEL PROCESSORS IN HIS REVIEWS. AS YOU DON'T HAVE TO DO THAT WITH AMD CPU'S. WHATEVER HAPPENED TO A LEVEL PLAYING FIELD ?
Can somebody help me ?
I have a i5-7300hq
About 1-2 months ago it was turboing to 3.5ghz with gaming now its only 3.1ghz turbo when game is open , but if i close the game it goes back to 3.5ghz
Also cpu usage is high at idle 25-30% and also ram is being used 3500mb ..
Using win 10 os . Computer is 4 months old ..
After all the news over the last couple of days one thing is sure. Intel will get sued...bad. Especially since the Intel boss reduced his own stocks to a bare minimum before giving a full briefing on IT to shareholders. Smells like insider trading. Big stock holders e.g. banks do not like to get screwed over.
Over the long run i would say...yeah Intel could get similar treatment in the US like that VW manager they locked up.
Welp, now that this is going to be patched, we won't be able to hack Iranian, Chinese, Russian, or North Korean computers and servers anymore. Thank Google for blowing the lid on one of the greatest backdoors *ever* created in cyber-security history. The implications of this hitting the public knowledge sphere is going to cripple the US cyberwars in the largest way it's ever been hit before, and probably ever will be.
Great I just invested in an E5-1650 HPZ420 that came with 32Gb of Ram. Looks like next build will be a Ryzen, hopefully, Ram will be cheaper by the time I build. Was holding off as I heard that there were stability issues with Ryzen on Ubuntu. The server market will hurt Intel big time. Intel will need to do something otherwise the server market will see AMD as a more attractive alternative. Doing nothing but offer new server chips without the bug is not an option.
Wow, you just opened my eyes. I hadn't looked at it that way, but I think you're onto something. It seems to me that the CPU industry is going the way of Apple with planned obsolescence. Their using fear tactics by utilizing the "security flaw" as an excuse to limit our hardware with software.
If that's what's really going on then we shouldn't stand for it. The problem is that the issue sounds complicated enough that most people won't go digging into it to call them on their bullshit. It would probably be a nightmare to prove in court... if anyone could even take it that far.
Intel is stuck where they can't improve CPU's as much as they want, so instead of them improving CPU's due to lack of intellect and personal to enhance it, they opt to fraud their previous products that they no longer have warranty, is the same fraudulent market strategy that Sony has always implemented but people are too ignorant to understand it, Sony is far worse when it comes to making technology and fraud their customers and they get away with it, Intel also has gotten away with a lot of fraud, only Apple is doing things the less fraudulent way.
"You take the blue pill, the story ends. You wake up in your bed and believe whatever you want to believe. You take the red pill, you stay in Wonderland, and I show you how deep the rabbit hole goes."
Morpheus to Neo 1999
( Or what....about as long as Intel has known???)
Who knows man. They won't tell ya.
While Meltdown might only be affecting Intel CPU''s, Spectre is affecting Intel, AMD, ARM CPU's meaning smartphones are also vulnerable. So don't just cheer yet because you have an AMD (I have both AMD and Intel).
Intel Management Engine may prevent security vulnerabilities, but problem is that if I install Intel ME, then I cannot play co-op campaign in Gears of War 4 PC since it'll most likely cause my NAT to be restricted, and thus, I cannot play co-op campaign.
i need help, my windows update is not working. i only get this message "Windows update cannot currently check for updates, because the service is not running. You may need to restart your computer." i have tried from restarting to troubleshooting, nothing seems to work
That the meltdown bug has been discovered now even though it exists since 1995 isn't hardly surprising. Containers are only now popular and the meltdown bug is a problem for container technology. So get ready for more container security related bugs and leaks.
bobsaget823 You sure you aren't projecting your neckbeardiness unto me? Also, a triggered reaction like this one of those that I was hoping for. Thank you for providing. If I could ask for one more favor of you, I could use some more salt, I want to store it for later use and consumption.
Nail on the head Brian! These bozos are giving us (the price/performance consumers) the shaft. This is just way too scripted and information managed to not be intel shenanigans. My only question is can I REFUSE the update? I'm running a 3570k and don't want any part of it.