ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Major Intel CPU vulnerability

    IT Discussion
    29
    260
    26.2k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller
      last edited by

      https://www.cnbc.com/2018/01/04/intel-ceo-reportedly-sold-shares-after-the-company-already-knew-about-massive-security-flaws.html

      The filing showed that the sales were part of a 10b5-1 plan, which was created on Oct. 30, just a month before Krzanich sold the shares. The 10b5-1 is a trading plan that company executives set up to sell stocks they own at a pre-determined time so that they are not accused of insider trading.

      The reports about a 2015 plan appear to be misdirection to make people miss that there was a replacement plan put in place months after he know about the chip flaw. How much "proof" do you want? The "proof" that @StorageNinja isn't proof at all and relies solely on information like this not arising. That there was "a plan" before hand is a red herring.

      1 Reply Last reply Reply Quote 0
      • scottalanmillerS
        scottalanmiller
        last edited by

        One month before does not make an SEC pattern. This wasn't just not a pattern, it was basically a single transaction.

        1 Reply Last reply Reply Quote 0
        • ObsolesceO
          Obsolesce
          last edited by

          I really like the sources WordFence / Defiant uses:

          https://www.defiant.com/meltdown-spectre-impact

          1 Reply Last reply Reply Quote 0
          • mlnewsM
            mlnews
            last edited by

            AMD has found that it is vulnerable to Spectre Variant 2.

            1 Reply Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller
              last edited by

              http://www.phoronix.com/scan.php?page=news_item&px=GCC-8-Spectre-Mitigation-Lands

              1 Reply Last reply Reply Quote 1
              • ObsolesceO
                Obsolesce
                last edited by Obsolesce

                Fedora and Spectre update: https://fedoramagazine.org/update-ongoing-meltdown-spectre-work/

                1 Reply Last reply Reply Quote 1
                • DanpD
                  Danp
                  last edited by

                  Easily examine and understand any Windows system's hardware and software capability to
                  prevent Meltdown and Spectre attacks.

                  https://www.grc.com/inspectre.htm

                  AmbarishrhA 1 Reply Last reply Reply Quote 3
                  • AmbarishrhA
                    Ambarishrh @Danp
                    last edited by

                    @danp said in Major Intel CPU vulnerability:

                    Easily examine and understand any Windows system's hardware and software capability to
                    prevent Meltdown and Spectre attacks.

                    https://www.grc.com/inspectre.htm

                    Anyone tried this?

                    travisdh1T NashBrydgesN 2 Replies Last reply Reply Quote 0
                    • travisdh1T
                      travisdh1 @Ambarishrh
                      last edited by

                      @ambarishrh said in Major Intel CPU vulnerability:

                      @danp said in Major Intel CPU vulnerability:

                      Easily examine and understand any Windows system's hardware and software capability to
                      prevent Meltdown and Spectre attacks.

                      https://www.grc.com/inspectre.htm

                      Anyone tried this?

                      Took a look at the laptop I was working on today with it. Found out it hadn't applied the latest updates, and it had the correct status and explanation both times I ran it.

                      Steve Gibson is a software guy, not a security specialist (obviously), he normally writes good programs/utilities.

                      1 Reply Last reply Reply Quote 0
                      • NashBrydgesN
                        NashBrydges @Ambarishrh
                        last edited by

                        @ambarishrh said in Major Intel CPU vulnerability:

                        @danp said in Major Intel CPU vulnerability:

                        Easily examine and understand any Windows system's hardware and software capability to
                        prevent Meltdown and Spectre attacks.

                        https://www.grc.com/inspectre.htm

                        Anyone tried this?

                        Yep. I have on a Dell R230 and R620. It correctly identified that the R230 was fully updated and as patched as possible, and that the R620 was still waiting for the microcode and bios update from Dell. Nice and easy for validation once you've applied your patches and updates.

                        1 Reply Last reply Reply Quote 0
                        • IRJI
                          IRJ
                          last edited by

                          Alot of really good content in this thread. I am thinking I should rename it to reflect updates on Spectre/Meltdown. Any ideas on renaming it?

                          ObsolesceO 1 Reply Last reply Reply Quote 0
                          • ObsolesceO
                            Obsolesce @IRJ
                            last edited by

                            @irj said in Major Intel CPU vulnerability:

                            Alot of really good content in this thread. I am thinking I should rename it to reflect updates on Spectre/Meltdown. Any ideas on renaming it?

                            Spectre & Meltdown

                            1 Reply Last reply Reply Quote 0
                            • momurdaM
                              momurda
                              last edited by

                              Ami correct, Intel isnt even going to release patch for the vast majority of the cpus they sold in the last 10 years?  That is what i care about, the 'ancient' 2013 cpus i have in my server room that wont be getting patched.  Not to mention the 4930k i have at home that is still faster than most of what they sell today, but wont be patched either.

                              DustinB3403D ObsolesceO 2 Replies Last reply Reply Quote 0
                              • DustinB3403D
                                DustinB3403 @momurda
                                last edited by

                                @momurda said in Major Intel CPU vulnerability:

                                Ami correct, Intel isnt even going to release patch for the vast majority of the cpus they sold in the last 10 years?  That is what i care about, the 'ancient' 2013 cpus i have in my server room that wont be getting patched.  Not to mention the 4930k i have at home that is still faster than most of what they sell today, but wont be patched either.

                                I wouldn't hold my breath, this vulnerability has bolstered their future sales for any diehard Intel fans.

                                1 Reply Last reply Reply Quote 0
                                • ObsolesceO
                                  Obsolesce @momurda
                                  last edited by

                                  @momurda said in Major Intel CPU vulnerability:

                                  Not to mention the 4930k i have at home that is still faster than most of what they sell today, but wont be patched either.

                                  Well yeah... a $1,000 CPU you bought years ago would of course be better than a <$200 CPU you buy today.

                                  If you spend $1000 on a CPU today, it'll be WAY better than your 4930k.

                                  It doesn't make sense to patch CPUs based on their performance level...

                                  momurdaM 1 Reply Last reply Reply Quote 1
                                  • momurdaM
                                    momurda @Obsolesce
                                    last edited by

                                    @tim_g It was 500 dollars. Bought in 2013. Still not getting a fix, that is the problem. Dont give a fuck how fast it is. Same with the Xeons in the server room.
                                    This is the largest chipmaker in the world, they wont even make out a fix for over 2/3 of their customers. This would be like GM having antilock brake problems for 15 years on all cars, and only giving recalls out to cars sold in the last 3 years. total bullshit.

                                    IRJI DashrenderD ObsolesceO 3 Replies Last reply Reply Quote 2
                                    • IRJI
                                      IRJ @momurda
                                      last edited by

                                      @momurda said in Major Intel CPU vulnerability:

                                      @tim_g It was 500 dollars. Bought in 2013. Still not getting a fix, that is the problem. Dont give a fuck how fast it is. Same with the Xeons in the server room.
                                      This is the largest chipmaker in the world, they wont even make out a fix for over 2/3 of their customers. This would be like GM having antilock brake problems for 15 years on all cars, and only giving recalls out to cars sold in the last 3 years. total bullshit.

                                      The car analogy sold me. With this type of vulnerability the safety is very similar to having a brake problem.

                                      1 Reply Last reply Reply Quote 0
                                      • DashrenderD
                                        Dashrender @momurda
                                        last edited by

                                        @momurda said in Major Intel CPU vulnerability:

                                        @tim_g It was 500 dollars. Bought in 2013. Still not getting a fix, that is the problem. Dont give a fuck how fast it is. Same with the Xeons in the server room.
                                        This is the largest chipmaker in the world, they wont even make out a fix for over 2/3 of their customers. This would be like GM having antilock brake problems for 15 years on all cars, and only giving recalls out to cars sold in the last 3 years. total bullshit.

                                        There are federal mandates on how long automakers must make recalls.

                                        I don't think such a thing exists for things like this. Should their be? Oh hell yeah! But frankly I don't expect it to be more than 5 years (though 10 would be great).

                                        It would be awesome to see federal law - if you make a computer based/software based widget, you must provide security related fixes for 10 years.

                                        LOL - like that will ever happen.

                                        scottalanmillerS 1 Reply Last reply Reply Quote 1
                                        • ObsolesceO
                                          Obsolesce @momurda
                                          last edited by Obsolesce

                                          @momurda said in Major Intel CPU vulnerability:

                                          @tim_g It was 500 dollars. Bought in 2013. Still not getting a fix, that is the problem. Dont give a fuck how fast it is. Same with the Xeons in the server room.
                                          This is the largest chipmaker in the world, they wont even make out a fix for over 2/3 of their customers. This would be like GM having antilock brake problems for 15 years on all cars, and only giving recalls out to cars sold in the last 3 years. total bullshit.

                                          Yeah I get the point. I agree they should provide a fix for them all as far back as Operating System vendors (Microsoft, Apple, Linux Distros, etc) will provide OS patches for AT LEAST.

                                          1 Reply Last reply Reply Quote 1
                                          • scottalanmillerS
                                            scottalanmiller @Dashrender
                                            last edited by

                                            @dashrender said in Major Intel CPU vulnerability:

                                            @momurda said in Major Intel CPU vulnerability:

                                            @tim_g It was 500 dollars. Bought in 2013. Still not getting a fix, that is the problem. Dont give a fuck how fast it is. Same with the Xeons in the server room.
                                            This is the largest chipmaker in the world, they wont even make out a fix for over 2/3 of their customers. This would be like GM having antilock brake problems for 15 years on all cars, and only giving recalls out to cars sold in the last 3 years. total bullshit.

                                            There are federal mandates on how long automakers must make recalls.

                                            I don't think such a thing exists for things like this. Should their be? Oh hell yeah! But frankly I don't expect it to be more than 5 years (though 10 would be great).

                                            It would be awesome to see federal law - if you make a computer based/software based widget, you must provide security related fixes for 10 years.

                                            LOL - like that will ever happen.

                                            I don't think that it would be great. It would encourage all kinds of bad things, like intentionally fly by night organizations and a lot of small, cheap stuff not able to be made.

                                            DashrenderD 1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 6
                                            • 7
                                            • 12
                                            • 13
                                            • 5 / 13
                                            • First post
                                              Last post