• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

Massive security hole in CPU's incoming?Official Meltdown/Spectre Discussion Thread

Page 87 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.
Well, we know generally that the third iteration of anything is usually when it comes out of beta so good for AMD.

Intel? They are not gonna learn anything until they get rid of the cancerous people who were hired during BK's era and still damaging Intel with their politics.
 
Would seem so.

"This is also the first time seeing microcode updates for Arrow Lake U / S / HX / H, Granite Rapids AP/SP, and Lunar Lake as part of the Linux CPU microcode collection."
No mention of AMD in any of that ??
 
No mention of AMD in any of that ??
These vulnerabilities are made possible by the patches made against Spectre for various architectures, the exploits need specific combos of architecture + Spectre patch to work. For now there are no reported vulnerabilities on the AMD side, though we'll have to wait and see if none were found later than the Intel ones.
 
These vulnerabilities are made possible by the patches made against Spectre for various architectures, the exploits need specific combos of architecture + Spectre patch to work. For now there are no reported vulnerabilities on the AMD side, though we'll have to wait and see if none were found later than the Intel ones.
Just asking. Thanks
 
Do "we" still care about all this?
Yes, "we" care:
It was just yesterday that Training Solo was made public as a new speculative execution CPU vulnerability affecting some Intel and Arm CPUs... Today another one is now public for Intel processors: Branch Privilege Injection.
Intel has developed a microcode update for affected processors and provided us with one to evaluate on Alder Lake. We were able to verify that the microcode update stops our primitives that we use in the paper to detect the vulnerabilities. Our performance evaluation shows up to 2.7% overhead for the microcode mitigation on Alder Lake. We have also evaluated several potential alternative mitigation strategies in software with overheads between 1.6% (Coffee Lake Refresh) and 8.3% (Rocket lake).
Branch Privilege Injection affects all Intel CPUs since the 9th Gen Core CPUs (Coffee Lake Refresh) while the Indirect Branch Prediction Barrier vector goes back to 7th Gen Core (Kaby Lake) processors.
 
It's a vulnerability...
It seems that it will be necessary to do more research and wash it off.
Of course, it's not found in other manufacturers' processors, so the conceit of being safe doesn't work.
 
Back
Top