Jump to content
  • Intel Patches 'Critical Weakness' Found in Billions of Processors

    aum

    • 2 comments
    • 660 views
    • 2 minutes
     Share


    • 2 comments
    • 660 views
    • 2 minutes

    The fix does come with a big performance hit and an opt-out, though.

     

    Intel fixed the security flaw known as "Downfall(Opens in a new window)" this week, which is described as a "critical weakness found in billions of modern processors" by the researcher who discovered it.

     

    That security researcher is Daniel Moghimi from the University of California San Diego, and the vulnerability he found affects Intel processors released between 2015 and 2019. More specifically, Downfall impacts processors from the 6th-gen Skylake to the 11th-gen Tiger Lake, and Intel has produced a detailed list(Opens in a new window) of the affected chips. It's also worth noting that, rather than using Downfall, Intel prefers to call the vulnerability Gather Data Sampling (GDS).

     

    So what does Downfall/GDS allow a hacker to do? According to Moghimi, a hacker can "target high-value credentials such as passwords and encryption keys" and the vulnerability only requires the attacker and victim to share the same physical CPU core. That may sound highly implausible, but when you consider multitasking, multithreading, servers, and cloud computing, Moghimi says this flaw "most likely" impacts us all.

     

    The good news is, Intel has now released a fix. The bad news is, that fix does come with a significant performance hit(Opens in a new window) for certain types of workload. Specifically, Intel believes the performance of scientific and visualization engineering workloads will be impacted most heavily. Moghami believes the overhead of the mitigation can be as high as a 50% depending on the workload.

     

    With that in mind, Intel decided to offer an opt-out mechanism to disable the mitigation, but turned the mitigation on by default. Offering an opt-out means we can't be sure which Intel servers are immune to the vulnerability because it's up to the owner of the server to decide whether the fix is applied.

     

    Source

    • Like 3

    User Feedback

    Recommended Comments

    20 minutes ago, funkyy said:

    So, damned if we do and damned if we don't.:w00t::w00t::w00t:

    As is well known -- experienced -- most things in this world are like this.   No choice in the matter!

    Link to comment
    Share on other sites




    Join the conversation

    You can post now and register later. If you have an account, sign in now to post with your account.
    Note: Your post will require moderator approval before it will be visible.

    Guest
    Add a comment...

    ×   Pasted as rich text.   Paste as plain text instead

      Only 75 emoji are allowed.

    ×   Your link has been automatically embedded.   Display as a link instead

    ×   Your previous content has been restored.   Clear editor

    ×   You cannot paste images directly. Upload or insert images from URL.


  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...