this post was submitted on 13 Aug 2023
860 points (99.0% liked)

Technology

59135 readers
3093 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Oh no.

top 50 comments
sorted by: hot top controversial new old
[–] eager_eagle@lemmy.world 249 points 1 year ago (2 children)

Downfall, Inception, Meltdown, Spectre, I hate to see new vulnerabilities, but their naming choices are solid.

[–] elbarto777@lemmy.world 122 points 1 year ago (1 children)

They should name them after their investors and board members.

[–] nikt@lemmy.ca 28 points 1 year ago

Gelsinger, McKeon, and Lavender do have a nice ring to them.

[–] dingleberry@discuss.tchncs.de 47 points 1 year ago (2 children)
[–] elvith@feddit.de 49 points 1 year ago* (last edited 1 year ago) (1 children)

Imagine a bug in the ALU when adding two octal values - Octoplussy

Or a bug in a specific Intel generation - Skylakefall

[–] emogu@lemmy.world 21 points 1 year ago

The next one will be discovered On Her Motherboard’s Secret Processes

load more comments (1 replies)
[–] cybervseas@lemmy.world 171 points 1 year ago (3 children)

Intel claims most consumer software shouldn’t see much impact, outside of image and video editing workloads..

But that's, like the one place other than games where consumers are looking for performance. What's left, web browsing and MS Office?

[–] eager_eagle@lemmy.world 71 points 1 year ago (1 children)

"whew* my horrible bubble sort implementation is safe from performance impacts

load more comments (1 replies)
[–] philluminati@lemmy.ml 11 points 1 year ago

It’s not they aren’t impacted only you “don’t see the impact” as noticeably.

load more comments (1 replies)
[–] TimeMuncher2@kbin.social 85 points 1 year ago (3 children)

According to him, billions of Intel processors are affected, which are used in private user computers as well as in cloud servers.
Update: Intel’s Downfall was closely followed by AMD’s Inception, a newfound security hole affecting all Ryzen and Epyc processors.

so both desktop and server chips are affected on both cpu manufacturers products. can't take any measures if your password is online on some server.

[–] TWeaK@lemm.ee 28 points 1 year ago (1 children)

I was going to say, AMD had a flaw of similar severity. And they won't have a fix for a few months for most affected CPUs, and that fix will likely incur a loss in performance.

Basically it sounds like both of these flaws are due to the security chip. I can't help but feel like these flaws are by design. /tinfoil

load more comments (1 replies)
[–] Wats0ns@sh.itjust.works 24 points 1 year ago

Downfall was disclosed to Intel a year ago but was on embargo until this week. Can't help but suspect that Intel waited for AMD to be impacted by a similar event to reveal downfall

load more comments (1 replies)
[–] AvgJoe@lemmy.world 61 points 1 year ago* (last edited 1 year ago) (2 children)

It took them a year for a microcode fix and it still has a performance loss of 50% in some cases? Ew

[–] Gsus4@feddit.nl 56 points 1 year ago* (last edited 1 year ago) (2 children)

So they created a massive vulnerability by misimplementing speculative execution which promised a, what, 10% speed gain tops and now that it was discovered you have to patch it and lose 50%? Genius.

And they get to keep the money from the purchase.

load more comments (1 replies)
[–] ljdawson@lemmy.world 13 points 1 year ago
[–] ram@feddit.nl 60 points 1 year ago* (last edited 1 year ago) (1 children)

If you get caught we've never met.

load more comments (1 replies)
[–] dual_sport_dork@lemmy.world 53 points 1 year ago* (last edited 1 year ago) (3 children)

Ha-ha. My chip's too old to be affected. I don't see my architecture on the list.

I knew putting off upgrading for around a decade would pay off. (Windows Update tells me my PC is not "ready" for Windows 11 due to its hardware, either. Oh no, whatever shall I do.)

[–] atticus88th@lemmy.world 11 points 1 year ago

Dont the older chips suffer from a greater performance drop from spectre and meltdown vulnerabilities?

[–] ArcaneSlime@lemmy.dbzer0.com 11 points 1 year ago

This inspires confidence with my 2010 ass toshiba sattelite with an i5 and 8gb DDR3. I need to look and see if mine is too old lol.

load more comments (1 replies)
[–] RobotToaster@infosec.pub 46 points 1 year ago (5 children)

They really should be recalled like they were forced to when the fdiv bug happened https://en.wikipedia.org/wiki/Pentium_FDIV_bug

load more comments (5 replies)
[–] FrankFrankson@lemmy.world 45 points 1 year ago (4 children)

Every article is a copy paste of the same bullshit talking about the vulnerability and pointing to the stupid cryptic list of processors that requires you to jump through hoops to read it. You can't just search for your processor in a database I mean fuck that would take them at least an a couple hours of their precious time to set up and they have only had a year. How do you fix it? Why with a microcode update of course!!...from where you ask? Well don't worry just look at the cryptic list it will tell you if you need a microcode update!!

Fuck every article about this shit. Anyone wanna bust an Eli5 on how to fix this problem for people? (I was assuming it's a BIOS update but the articles have only confused me further)

[–] stardreamer@lemmy.blahaj.zone 33 points 1 year ago* (last edited 1 year ago)

ELI5, or ELIAFYCSS (Explain like I'm a first year CS student): modern x86 CPUs have lots of optimized instructions for specific functionality. One of these is "vector instructions", where the instruction is optimized for running the same function (e.g. matrix multiply add) on lots of data (e.g. 32 rows or 512 rows). These instructions were slowly added over time, so there are multiple "sets" of vector instructions like MMX, AVX, AVX-2, AVX-512, AMX...

While the names all sound different, the way how all these vector instructions work is similar: they store internal state in hidden registers that the programmer cannot access. So to the user (application programmer or compiler designer) it looks like a simple function that does what you need without having to micromanage registers. Neat, right?

Well, problem is somewhere along the lines someone found a bug: when using instructions from the AVX-2/AVX-512 sets, if you combine it with an incorrect ordering of branch instructions (aka JX, basically the if/else of assembly) you get to see what's inside these hidden registers, including from different programs. Oops. So Charlie's "Up, Up, Down, Down, Left, Right, Left, Right, B, B, A, A" using AVX/JX allows him to see what Alice's "encrypt this zip file with this password" program is doing. Uh oh.

So, that sounds bad. But lets take a step back: how bad would this affect existing consumer devices (e.g. Non-Xeon, non-Epyc CPUs)?

Well good news: AVX-512 is not available on most Intel/AMD consumer CPUs until recently (13th gen/zen 4, and zen 4 isn't affected). So 1) your CPU most likely doesn't support it and 2) even if your CPU supports it most pre-compiled programs won't use it because the program would crash on everyone else's computer that doesn't have AVX-512. AVX-512 is a non-issue unless you're running Finite Element Analysis programs (LS-DYNA) for fun.

AVX-2 has a similar problem: while released in 2013, some low end CPUs (e.g. Intel Atom) didn't have them for a long time (this year I think?). So most compiled programs wouldn't compile with AVX-2 enabled. This means whatever game you are running now, you probably won't see a performance drop after patching since your computer/program was never using the optimized vector instructions in the first place.

So, the affect on consumer devices is minimal. But what do you need to do to ensure that your PC is secure?

Three different ideas off the top of my head:

  1. BIOS update. The CPU has a some low level firmware code called microcode which is included in the BIOS. The new patched version adds additional checks to ensure no data is leaked.

  2. Update the microcode package in Linux. The microcode can also be loaded from the OS. If you have an up-to-date version of Intel-microcode here this would achieve the same as (1)

  3. Re-compile everything without AVX-2/AVX-512. If you're running something like Gentoo, you can simply tell GCC to not use AVX-2/AVX-512 regardless of whether your CPU supports it. As mentioned earlier the performance loss is probably going to be fine unless you're doing some serious math (FEA/AI/etc) on your machine.

[–] SymphonicResonance@lemmy.world 11 points 1 year ago (2 children)

You can't just search for your processor in a database I mean fuck that would take them at least an a couple hours of their precious time to set up and they have only had a year. How do you fix it?

This page tells you how to get your CPUID: https://www.intel.com/content/www/us/en/support/articles/000006831/processors/processor-utilities-and-programs.html

Then search for the CPUID here: https://www.intel.com/content/www/us/en/developer/topic-technology/software-security-guidance/processors-affected-consolidated-product-cpu-model.html

load more comments (2 replies)
load more comments (2 replies)
[–] chicken@lemmy.dbzer0.com 44 points 1 year ago (3 children)

This vulnerability, identified as CVE-2022-40982, enables a user to access and steal data from other users who share the same computer.

So just continue not letting people use my computer, got it. Very simple fix.

[–] ryannathans@lemmy.world 24 points 1 year ago

Shared use of servers is probably the main issue

load more comments (2 replies)
[–] HexesofVexes@lemmy.world 43 points 1 year ago (3 children)

Guess it's time for another FPS hit...

While the article says it won't impact most applications, I suspect it's closer to saying "won't impact most applications as much".

load more comments (3 replies)
[–] scottywh@lemmy.world 36 points 1 year ago (4 children)

/tinfoilhat

I admittedly stopped reading halfway through but I feel like these newest vulnerabilities being discovered are probably just fucking government back doors the manufacturers have been forced to include.

/tinfoilhat

[–] luciferofastora@discuss.online 14 points 1 year ago* (last edited 1 year ago)

I can't comment on the general trend, but this specific one seems a bit too circumstantial to be of use for a serious spying effort. You'd have to have the spyware running parallel to the apps usong passwords you want to steal in a specific way.

The risk exists, which is bad enough for stochastic reasons (eventually, someone will get lucky and manage to grab something sensitive, and since the potential damage from that is incalculable, the impact axis alone drives this into firm "you need to get that fix out asap), but probably irrelevant in terms of consistency, which would be what you'd need to actually monitor anyone.

If you manage to grab enough info to crack some financial access data, you can steal money. If you can take over some legit online account or obtain some email-password combo, you can sell it. But if you want to monitor what people are doing in otherwise private systems, you need some way to either check on demand or log their actions and periodically send them to your server.

It would be far more reliable to have injection backdoors to allow you access by virtue of forcing a credential check to come up valid than to hope for the lucky grab of credentials the user might change at an arbitrary moment in time.

load more comments (3 replies)
[–] DarkThoughts@kbin.social 34 points 1 year ago (1 children)
[–] lowleveldata@programming.dev 30 points 1 year ago (3 children)

Intel’s newer 12th-gen and 13th-gen Core processors are not affected.

Oh ok

[–] madeinthebackseat@lemmy.world 52 points 1 year ago (1 children)
[–] 1984@lemmy.today 20 points 1 year ago (1 children)

Upgrade to get 3% performance gains on paper and no noticeable real performance gain!

[–] glockenspiel@lemmy.world 16 points 1 year ago

Now it's more like "upgrade to maintain your level of performance, because our patched CPUs take a 50% performance hit" (per the article).

That is quite convenient for them. I'm sure not a conspiracy given depth of the issue, just very convenient if people heed the call.

Which most won't. Enterprise is likely already on the newer gens aa part of normal refresh cycles. Maybe this just accelerates that a bit.

[–] porksoda@lemmy.world 20 points 1 year ago

Oh don't worry, you'll hear about that vulnerability in two years.

load more comments (1 replies)
[–] Veedem@lemmy.world 27 points 1 year ago

Yikes the performance hit is scary but if you’re running a server, what option do you have?

[–] iHUNTcriminals@lemm.ee 25 points 1 year ago* (last edited 1 year ago)

Jokes on them. I'm already watched by criminals and am used to companies throttling products.

[–] Chickenstalker@lemmy.world 23 points 1 year ago (2 children)

> Downfall

Is the Intel CEO holed up in a bunker and raging at his chip designers?

[–] 13esq@lemmy.world 11 points 1 year ago* (last edited 1 year ago)

If it's anything like the industry that I work in, the CEO would have been informed of the short comings of the design numerous times and given a response along the lines of "does it make our CPUs faster and more powerful though?".

The CEO won't be pissed of at his chip designer, they'll be pissed because they've been caught out.

load more comments (1 replies)
[–] 1984@lemmy.today 18 points 1 year ago

Here we go again....

[–] nl4real@lemmy.world 10 points 1 year ago

My old-ass Ivy Bridge: Oh no! Anyway...

load more comments
view more: next ›