+ Reply to Thread
Results 1 to 11 of 11

Thread: Intel CPU processor security hole - another one (Hits LINUX and Windows)

  1. Link to Post #1
    Unsubscribed
    Join Date
    23rd June 2013
    Location
    North America
    Age
    72
    Posts
    6,884
    Thanks
    12,723
    Thanked 29,293 times in 6,140 posts

    Exclamation Intel CPU processor security hole - another one (Hits LINUX and Windows)

    Intel CPU processor security hole - another one (Hits LINUX and Windows)

    (Note: Re-copying the TITLE of the thread to prevent any 'confusion'. If you are running on an AMD CPU or other central processing unit, don't bother trying to run the INTEL cpu testing program )

    "Intel advises Microsoft and Linux users to download and run the Intel-SA-00086 detection tool to determine whether their systems are vulnerable to the above bugs.

    "If you are at risk, you must obtain and install firmware updates from your computer's manufacturer, if and when they become available. The new code was developed by Intel, but it needs to be cryptographically signed by individual hardware vendors in order for it to be accepted and installed by the engine."

    oops...

    Quote Security
    Intel finds critical holes in secret Management Engine hidden in tons of desktop, server chipsets
    Bugs can be exploited to extract info, potentially insert rootkits
    Intel finds critical holes in secret Management Engine hidden in tons of desktop, server chipsets...

    Quote Intel today admitted its Management Engine (ME), Server Platform Services (SPS), and Trusted Execution Engine (TXE) are vulnerable to multiple worrying security flaws, based on the findings of external security experts.

    The firmware-level bugs allow logged-in administrators, and malicious or hijacked high-privilege processes, to run code beneath the operating system to spy on or meddle with the computer completely out of sight of other users and admins. The holes can also be exploited by network administrators, or people masquerading as admins, to remotely infect machines with spyware and invisible rootkits, potentially.

    Meanwhile, logged-in users, or malicious or commandeered applications, can leverage the security weaknesses to extract confidential and protected information from the computer's memory, potentially giving miscreants sensitive data – such as passwords or cryptographic keys – to kick off other attacks. This is especially bad news on servers and other shared machines.
    Any program which created "elevated privileges" can gain access.. (I've talked about certain programs before which have been demonstrated to create "elevated privileges"..)

    The INTEL CPU manufacturer download for the vulnerability check is located here:
    https://downloadcenter.intel.com/download/27150 (Intel-SA-00086 Detection Tool) pick OS

    Quote Affected products:

    • 6th, 7th & 8th Generation Intel® Core™ Processor Family
    • Intel® Xeon® Processor E3-1200 v5 & v6 Product Family
    • Intel® Xeon® Processor Scalable Family
    • Intel® Xeon® Processor W Family
    • Intel® Atom® C3000 Processor Family
    • Apollo Lake Intel® Atom Processor E3900 series
    • Apollo Lake Intel® Pentium™
    • Celeron™ N and J series Processors
    After running it check the LOG file to see if you have a potentially compromised CPU. I've run it and my CPU shows safe for this hardware bug.

    reference pages:
    https://www.theregister.co.uk/2017/1...irmware_flaws/
    and
    https://arstechnica.com/information-...vice-firmware/

    Quote The company has posted a detection tool on its support website for Windows and Linux to help identify systems that are vulnerable. In the security alert, members of Intel's security team stated that "in response to issues identified by external researchers, Intel has performed an in-depth comprehensive security review of its Intel® Management Engine (ME), Intel® Trusted Execution Engine (TXE), and Intel® Server Platform Services (SPS) with the objective of enhancing firmware resilience."

    Four vulnerabilities were discovered that affect Intel Management Engine firmware versions 11.0 through 11.20. Two were found in earlier versions of ME, as well as two in Server Platform Services version 4.0 firmware and two in TXE version 3.0.
    Last edited by Bob; 23rd November 2017 at 16:47. Reason: clarification of thread title in post

  2. Link to Post #2
    United States Avalon Member Michelle Marie's Avatar
    Join Date
    5th June 2011
    Location
    Oregon
    Posts
    2,626
    Thanks
    27,304
    Thanked 17,097 times in 2,584 posts

    Default Re: Intel CPU processor security hole - another one (Hits LINUX and Windows)

    Quote Posted by Bob (here)
    "Intel advises Microsoft and Linux users to download and run the Intel-SA-00086 detection tool to determine whether their systems are vulnerable to the above bugs.

    "If you are at risk, you must obtain and install firmware updates from your computer's manufacturer, if and when they become available. The new code was developed by Intel, but it needs to be cryptographically signed by individual hardware vendors in order for it to be accepted and installed by the engine."

    oops...

    Quote Security
    Intel finds critical holes in secret Management Engine hidden in tons of desktop, server chipsets
    Bugs can be exploited to extract info, potentially insert rootkits
    Intel finds critical holes in secret Management Engine hidden in tons of desktop, server chipsets...

    Quote Intel today admitted its Management Engine (ME), Server Platform Services (SPS), and Trusted Execution Engine (TXE) are vulnerable to multiple worrying security flaws, based on the findings of external security experts.

    The firmware-level bugs allow logged-in administrators, and malicious or hijacked high-privilege processes, to run code beneath the operating system to spy on or meddle with the computer completely out of sight of other users and admins. The holes can also be exploited by network administrators, or people masquerading as admins, to remotely infect machines with spyware and invisible rootkits, potentially.

    Meanwhile, logged-in users, or malicious or commandeered applications, can leverage the security weaknesses to extract confidential and protected information from the computer's memory, potentially giving miscreants sensitive data – such as passwords or cryptographic keys – to kick off other attacks. This is especially bad news on servers and other shared machines.
    Any program which created "elevated privileges" can gain access.. (I've talked about certain programs before which have been demonstrated to create "elevated privileges"..)

    The INTEL CPU manufacturer download for the vulnerability check is located here:
    https://downloadcenter.intel.com/download/27150 (Intel-SA-00086 Detection Tool) pick OS

    Quote Affected products:

    • 6th, 7th & 8th Generation Intel® Core™ Processor Family
    • Intel® Xeon® Processor E3-1200 v5 & v6 Product Family
    • Intel® Xeon® Processor Scalable Family
    • Intel® Xeon® Processor W Family
    • Intel® Atom® C3000 Processor Family
    • Apollo Lake Intel® Atom Processor E3900 series
    • Apollo Lake Intel® Pentium™
    • Celeron™ N and J series Processors
    After running it check the LOG file to see if you have a potentially compromised CPU. I've run it and my CPU shows safe for this hardware bug.

    reference pages:
    https://www.theregister.co.uk/2017/1...irmware_flaws/
    and
    https://arstechnica.com/information-...vice-firmware/

    Quote The company has posted a detection tool on its support website for Windows and Linux to help identify systems that are vulnerable. In the security alert, members of Intel's security team stated that "in response to issues identified by external researchers, Intel has performed an in-depth comprehensive security review of its Intel® Management Engine (ME), Intel® Trusted Execution Engine (TXE), and Intel® Server Platform Services (SPS) with the objective of enhancing firmware resilience."

    Four vulnerabilities were discovered that affect Intel Management Engine firmware versions 11.0 through 11.20. Two were found in earlier versions of ME, as well as two in Server Platform Services version 4.0 firmware and two in TXE version 3.0.
    Just desktops? 💁 Not laptops?


    Thanks,
    MM
    ~*~ "The best way to predict the future is to create it." - Peter Drucker ~*~ “To laugh often and much; to win the respect of intelligent people and the affection of children...to leave the world a better place...to know even one life has breathed easier because you have lived. This is to have succeeded.” -Ralph Waldo Emerson ~*~ "Creative minds always have been known to survive any kind of bad training." - Anna Freud ~*~

  3. The Following 4 Users Say Thank You to Michelle Marie For This Post:

    Bob (23rd November 2017), dynamo (23rd November 2017), justntime2learn (23rd November 2017), mojo (23rd November 2017)

  4. Link to Post #3
    Unsubscribed
    Join Date
    23rd June 2013
    Location
    North America
    Age
    72
    Posts
    6,884
    Thanks
    12,723
    Thanked 29,293 times in 6,140 posts

    Default Re: Intel CPU processor security hole - another one (Hits LINUX and Windows)

    Hard telling - its based on the CPU type. The detection tool seems to work. I've run it on my laptop(s) for the I7 and it's clear.. I have numerous desktops to try the detection app on tho.. both Linux and windows..

    detection app page: https://downloadcenter.intel.com/download/27150
    Last edited by Bob; 23rd November 2017 at 01:18.

  5. Link to Post #4
    United States Avalon Member mojo's Avatar
    Join Date
    6th February 2011
    Posts
    5,996
    Thanks
    33,960
    Thanked 39,420 times in 5,645 posts

    Default Re: Intel CPU processor security hole - another one (Hits LINUX and Windows)

    Quote 6th, 7th & 8th Generation Intel® Core™ Processor Family
    Does 7 generation mean I7? Not sure but Im running a newer I7...

  6. The Following User Says Thank You to mojo For This Post:

    Bob (23rd November 2017)

  7. Link to Post #5
    Canada Avalon Member DeDukshyn's Avatar
    Join Date
    22nd January 2011
    Location
    From 100 Mile House ;-)
    Language
    English
    Age
    50
    Posts
    9,394
    Thanks
    29,778
    Thanked 45,445 times in 8,541 posts

    Default Re: Intel CPU processor security hole - another one (Hits LINUX and Windows)

    I recently refreshed my system with one of the new AMD 8 core Ryzen processors. I paid far less than half of what a i7-6900k costs but get 98% of the full load performance and better single core performance (with an overclock).

    being a new platform though, it doesn't come without it's own risks ...
    Last edited by DeDukshyn; 23rd November 2017 at 03:50.
    When you are one step ahead of the crowd, you are a genius.
    Two steps ahead, and you are deemed a crackpot.

  8. Link to Post #6
    United States Administrator ThePythonicCow's Avatar
    Join Date
    4th January 2011
    Location
    North Texas
    Language
    English
    Age
    76
    Posts
    28,581
    Thanks
    30,501
    Thanked 138,435 times in 21,490 posts

    Default Re: Intel CPU processor security hole - another one (Hits LINUX and Windows)

    Quote Posted by mojo (here)
    Quote 6th, 7th & 8th Generation Intel® Core™ Processor Family
    Does 7 generation mean I7? Not sure but Im running a newer I7...
    The 6th Generation "Skylake" Intel Core Desktop SKU's include such CPU's as the Core i7-6700, Core i5-6400, and Core i3-6100. Intel introduced this Generation in the second half of 2015.

    The 7th Generation "Kaby Lake" includes desktop SKU's Core i7-7700, Core i5-7400, and Core i3-7100. Intel introduced this Generation in the second half of 2016.

    The 8th Generation "Coffee Lake" includes desktop SKU's Core i8-8700, Core i5-8400 and Core i3-8100. Intel introduced this Generation in the second half of 2017.

    Each Intel "Core" generation includes various mobile and Xeon SKU's, in addition to such desktop SKU's as listed above.

    As I noted with bold font above, the "Generation" number is shown in the first digit of the four digit model number.

    In each Generation, the i7's are the higher end desktop and mobile SKU's, the i5's are the mid-range SKU's, and the i3's are the lower end SKU's.
    My quite dormant website: pauljackson.us

  9. The Following 5 Users Say Thank You to ThePythonicCow For This Post:

    Alan (23rd November 2017), Bob (23rd November 2017), DeDukshyn (23rd November 2017), mojo (23rd November 2017), norman (23rd November 2017)

  10. Link to Post #7
    Canada Avalon Member DeDukshyn's Avatar
    Join Date
    22nd January 2011
    Location
    From 100 Mile House ;-)
    Language
    English
    Age
    50
    Posts
    9,394
    Thanks
    29,778
    Thanked 45,445 times in 8,541 posts

    Default Re: Intel CPU processor security hole - another one (Hits LINUX and Windows)

    Quote Posted by mojo (here)
    Quote 6th, 7th & 8th Generation Intel® Core™ Processor Family
    Does 7 generation mean I7? Not sure but Im running a newer I7...
    7th and 8th gen are fairly recent - you could susceptible to this bug.

    ------------------

    It seems it potentially covers a broad range of all reasonably recent Intel processors - this would include laptop processors as well.
    When you are one step ahead of the crowd, you are a genius.
    Two steps ahead, and you are deemed a crackpot.

  11. The Following 2 Users Say Thank You to DeDukshyn For This Post:

    Bob (23rd November 2017), mojo (23rd November 2017)

  12. Link to Post #8
    United States Administrator ThePythonicCow's Avatar
    Join Date
    4th January 2011
    Location
    North Texas
    Language
    English
    Age
    76
    Posts
    28,581
    Thanks
    30,501
    Thanked 138,435 times in 21,490 posts

    Default Re: Intel CPU processor security hole - another one (Hits LINUX and Windows)

    Quote Posted by Bob (here)
    Hard telling - its based on the CPU type. The detection tool seems to work. I've run it on my laptop(s) for the I7 and it's clear.. I have numerous desktops to try the detection app on tho.. both Linux and windows..

    detection app page: https://downloadcenter.intel.com/download/27150
    Hah - that Intel tool informs me that my "AMD Ryzen 7 1700 Eight-Core Processor" may be vulnerable .
    My quite dormant website: pauljackson.us

  13. The Following 4 Users Say Thank You to ThePythonicCow For This Post:

    Bob (23rd November 2017), DeDukshyn (23rd November 2017), mojo (23rd November 2017), norman (23rd November 2017)

  14. Link to Post #9
    Unsubscribed
    Join Date
    23rd June 2013
    Location
    North America
    Age
    72
    Posts
    6,884
    Thanks
    12,723
    Thanked 29,293 times in 6,140 posts

    Default Re: Intel CPU processor security hole - another one (Hits LINUX and Windows)

    Quote Posted by Paul (here)
    Quote Posted by Bob (here)
    Hard telling - its based on the CPU type. The detection tool seems to work. I've run it on my laptop(s) for the I7 and it's clear.. I have numerous desktops to try the detection app on tho.. both Linux and windows..

    detection app page: https://downloadcenter.intel.com/download/27150
    Hah - that Intel tool informs me that my "AMD Ryzen 7 1700 Eight-Core Processor" may be vulnerable .
    Wonder why u were running an INTEL CPU checking app on an AMD Ryzen

    btw, with u running Linux, https://www.extremetech.com/computin...rare-linux-bug

    Quote AMD Replaces Ryzen CPUs for Users Affected By Rare Linux Bug

    ref: https://www.extremetech.com/computin...rare-linux-bug

    there’s been one low-level problem that we’ve been watching but haven’t previously reported on. In early June, Ryzen users running Linux began reporting segmentation faults when running multiple concurrent compilation workloads using multiple different versions of GCC. LVVM/Clang was not affected, and the issue appears confined to Linux. Moreover, it wasn’t apparently common, even among Linux users — Michael Larabel, of Phoronix.com, reported that his own test rigs had been absolutely solid, even under heavy workloads.

    Like the Pentium FDIV bug of yesteryear, this was a real issue, but one that realistically only impacted a fraction of a fraction of buyers. AMD had previously said it was investigating the problem (which isn’t present on any Epyc or Threadripper CPUs) and it’s now announced a solution: CPU replacement.

    Phoronix reports AMD provided them with a new Ryzen 7 1800X CPU and that this chip has refused to crash, even when running a “kill Ryzen” script that would previously deliberately create a compiler segmentation fault. While some users thought the issue was confined to a RAM, motherboard, or BIOS-related issue, Phoronix’s testing proves otherwise. Swap the new Ryzen 7 1800X for an older part, and the problem reappears. Switch back to the new chip, and it vanishes. Larabel has tentatively concluded that the issue appears confined to Ryzen CPUs manufactured before Week 25 of this year (the new chip was built in Week 30), but no other details on what caused it are available.

    The good news is, AMD is replacing the CPUs of anyone who has this issue. Again, while the issue is real, it appears to only trigger in an extremely small number of cases when running a Linux workload under specific and particular circumstances.

    CPU Errata Are the Rule, Not the Exception
    We tend to think of CPU errata as being show-stopping phenomena that occur only occasionally, but the opposite is true. The summary table of errata within Intel’s sixth-generation Core family is eight pages long. Most of these bugs are minor issues or relate to corner cases, but larger issues can break through. Intel’s original Atom architecture had a major FPU bug in which trying to perform two back-to-back x87 operations would double the execution time. CPU analyst Agner Fog writes (Page 162 / 233):

    Whenever there are two consecutive x87 instructions, the two instructions fail to pair and instead cause an extra delay of one clock cycle due to problems in the decoders. This gives a throughput of only one instruction every two clock cycles, while a similar code using XMM registers would have a maximum throughput of two instructions per clock cycle.

    This applies to all x87 instructions (names beginning with F), even the FNOP. For example, a sequence of 100 consecutive FNOP instructions takes 200 clock cycles to execute in my tests. If the 100 FNOPs are interspersed by 100 NOPs then the sequence takes only 100 clock cycles. It is therefore important to avoid consecutive x87 instructions.
    I thought about getting a Ryzen at one point but rejected that though -

    this is one of the reasons - AMD’s latest Ryzen processors performance hit by Windows 10 Scheduler bug

    Quote Unfortunately it seems Windows users on the latest version of Microsoft’s desktop OS will not be able to get the maximum benefit from the high performance, good value solution.

    A bug has been discovered in the Windows 10 Scheduler which limits the performance of AMD Ryzen CPUs. The issue is due to the difference between how Windows treat threading between Intel and AMD processors.

    For Intel hyperthreading it appropriately prioritizes the main thread and gives secondary threads lower priority. With AMD processors it treats all the threads as equal, meaning lower priority tasks are treated the same as higher priority tasks and overall performance suffers.

    Another bug also incorrectly identifies the amount of cache available per thread, with the Windows 10 Scheduler thinking each thread has 136 MB of RAM rather than the actual 20 MB available in the L2+L3 cache combined.

    At present the issue is only believed to affect Windows 10. Windows has had scheduler issues in the past, so we are sure a solution is only a software update away.

    In the mean time users can disable SMT in the BIOS to improve performance in gaming, but for more multi-threaded work it may be better to leave it enabled.

    ref: https://mspoweruser.com/amds-latest-...-sheduler-bug/
    due to the programs I have, they are not ported into Linux, so I am stuck with Windoz..

    Ryzen's - https://community.amd.com/thread/219589

    Quote
    Quote I have found that my Ryzen 7 1700 has a stable OC at 3.9 GHz using 1.4V of Vcore and has been tested by 15 min of Realbench, 1 hour linpak OCCT and Prime 95 and also serial passages of Cinebench R15 (between 5-6). My temps don't go over 58 C so still I have plenty of room to OC. However the problem comes from the chip itself that when I set my PC to sleep or shutdown for sometime on reboot the multiplier gets stuck in 15.5 bringing my CPU to 1.550 GHz completely destroying its performance. I have partially solved the problem by creating an overclocked profile with different settings (e.g. 3.975 and 1.45 Vcore), saving it into the Asus Overclocking Profile tool, loading it, press F10 to save changes and reboot to get back into the BIOS, load my desired profile back and finally into OS to unlock the multiplier back to 39. It works but is kind of annoying to have to do this everytime I reboot.

    Actually, this problem seem to be happening whenever I apply offset values that place the Vcore between 1.39-1.44V for some reason. A pitty because I can see that my processor has still room to improve but is being gimped by no apparent reason.
    and so forth.. stuck with Intel for now.. stuck as I am, my next rig is an I9 - I can't spend 18 hours doing a rendering to have the processor crash do to the oooops.

    http://bgr.com/2017/05/29/intel-core...-vs-amd-ryzen/

    I'm looking at this one (I do 3D rendering extensively) - https://www.intel.com/content/www/us...i9-7980xe.html

    Ryzens have their own issues too - https://bugs.launchpad.net/ubuntu/+s...x/+bug/1690085

    https://linux.slashdot.org/story/17/...oblem-on-ryzen

    https://www.digitaltrends.com/comput...ix-fma3-crash/ - AMD found the root problem causing its new Ryzen processors to freeze desktops
    Last edited by Bob; 23rd November 2017 at 05:41.

  15. Link to Post #10
    Canada Avalon Member DeDukshyn's Avatar
    Join Date
    22nd January 2011
    Location
    From 100 Mile House ;-)
    Language
    English
    Age
    50
    Posts
    9,394
    Thanks
    29,778
    Thanked 45,445 times in 8,541 posts

    Default Re: Intel CPU processor security hole - another one (Hits LINUX and Windows)

    [QUOTE=Bob;1192426]
    Quote Posted by Paul (here)

    I thought about getting a Ryzen at one point but rejected that though -

    this is one of the reasons - AMD’s latest Ryzen processors performance hit by Windows 10 Scheduler bug

    Quote Unfortunately it seems Windows users on the latest version of Microsoft’s desktop OS will not be able to get the maximum benefit from the high performance, good value solution.

    A bug has been discovered in the Windows 10 Scheduler which limits the performance of AMD Ryzen CPUs. The issue is due to the difference between how Windows treat threading between Intel and AMD processors.

    For Intel hyperthreading it appropriately prioritizes the main thread and gives secondary threads lower priority. With AMD processors it treats all the threads as equal, meaning lower priority tasks are treated the same as higher priority tasks and overall performance suffers.

    Another bug also incorrectly identifies the amount of cache available per thread, with the Windows 10 Scheduler thinking each thread has 136 MB of RAM rather than the actual 20 MB available in the L2+L3 cache combined.

    At present the issue is only believed to affect Windows 10. Windows has had scheduler issues in the past, so we are sure a solution is only a software update away.

    In the mean time users can disable SMT in the BIOS to improve performance in gaming, but for more multi-threaded work it may be better to leave it enabled.

    ref: https://mspoweruser.com/amds-latest-...-sheduler-bug/
    due to the programs I have, they are not ported into Linux, so I am stuck with Windoz..

    Ryzen's - https://community.amd.com/thread/219589

    Quote
    Quote I have found that my Ryzen 7 1700 has a stable OC at 3.9 GHz using 1.4V of Vcore and has been tested by 15 min of Realbench, 1 hour linpak OCCT and Prime 95 and also serial passages of Cinebench R15 (between 5-6). My temps don't go over 58 C so still I have plenty of room to OC. However the problem comes from the chip itself that when I set my PC to sleep or shutdown for sometime on reboot the multiplier gets stuck in 15.5 bringing my CPU to 1.550 GHz completely destroying its performance. I have partially solved the problem by creating an overclocked profile with different settings (e.g. 3.975 and 1.45 Vcore), saving it into the Asus Overclocking Profile tool, loading it, press F10 to save changes and reboot to get back into the BIOS, load my desired profile back and finally into OS to unlock the multiplier back to 39. It works but is kind of annoying to have to do this everytime I reboot.

    Actually, this problem seem to be happening whenever I apply offset values that place the Vcore between 1.39-1.44V for some reason. A pitty because I can see that my processor has still room to improve but is being gimped by no apparent reason.
    and so forth.. stuck with Intel for now.. stuck as I am, my next rig is an I9 - I can't spend 18 hours doing a rendering to have the processor crash do to the oooops.

    http://bgr.com/2017/05/29/intel-core...-vs-amd-ryzen/

    I'm looking at this one (I do 3D rendering extensively) - https://www.intel.com/content/www/us...i9-7980xe.html

    Ryzens have their own issues too - https://bugs.launchpad.net/ubuntu/+s...x/+bug/1690085

    https://linux.slashdot.org/story/17/...oblem-on-ryzen

    https://www.digitaltrends.com/comput...ix-fma3-crash/ - AMD found the root problem causing its new Ryzen processors to freeze desktops


    The windows scheduler bug was fixed immediately if it even existed as suspected, the Linux bug was patched, and the other guy's issue seems specific to him or to his mother board. I have my 1700 @ 3.85 and 1.4v, ram@3200 with 14,15,15,16,36 timings and experience no issues. The OC is rock solid (I 3D render as well and have to prove perfect stability for both RAM and CPU - 15 minutes of prime95 doesn't cut it ... 30 minutes of Arnold or Corona render with Prime95 running and CPU-z stress test simultaneously makes me feel ok though) , and it renders 1715 in Cinebench (with the OC - exceeding 6900k score by a fair margin) but only cost me three hundred and seventy on sale (Canada - MemoryExpress).

    There were many bios updates and patches fairly soon after release that fixed most issues. I'd consider it quite a stable platform now with updates.

    The 7980X is a great chip for rendering ... if you can afford it and if you can keep it cool. Threadripper 1950x gets you ~80% of the rendering power at half the price -- if price / performance ratio is a concern. But if you just need the processor and not extensive PCI lanes then the i9 is a good choice. Also a new platform though with it's own teething issues, but Intel is usually quick to jump on those.



    I also ran the Intel checker for this bug as Paul did, but mine never completed the check after 10 minutes so I killed it. I have the same processor as his.
    Last edited by DeDukshyn; 23rd November 2017 at 06:20.
    When you are one step ahead of the crowd, you are a genius.
    Two steps ahead, and you are deemed a crackpot.

  16. The Following User Says Thank You to DeDukshyn For This Post:

    KiwiElf (23rd November 2017)

  17. Link to Post #11
    Unsubscribed
    Join Date
    23rd June 2013
    Location
    North America
    Age
    72
    Posts
    6,884
    Thanks
    12,723
    Thanked 29,293 times in 6,140 posts

    Default Re: Intel CPU processor security hole - another one (Hits LINUX and Windows)

    Still wonder why one would want to run an Intel CPU checker program designed for the Intel chip to try to run on an AMD processor..

    Every AMD I've used has given me problems, not over-clocked, running a very good power supply, good ram and a great motherboard (which was rated for overclocking). Every AMD under stress has locked up while running assorted versions of windows. As the programs I have won't port over to Linux, and it's useless to try to run emulation (due to speed and compatibility issues still with the programs, and drivers), I am stuck with windows. My programs run with multi-core, multi-thread, and such quite well. It's not a cluster although I have considered that for rendering, but, I am forced with a cluster to try to run on Linux. Again, more effort than it's worth to find a workaround.

    As I said, the thread is about the INTEL built in "hidden" processor "bugs" (the ME "Management Engine" and the "Trusted execution Engine or TXE) which can be apparently accessed with the right tools, unbeknownst to virus checkers/spyware and so forth to perform nefarious acts.. and the bugs that have been found, long term bugs, and programs which have the ability to elevate their status above normal user-level, (and access those engines..) .. which to me is worrisome.

    I don't have the series of INTEL processors which that bug is affecting. I'd wonder if such a bug was accidental or deliberate. I do need extreme rendering speed, and cutting down an 18 hour runtime to me is important, without risking a CPU lockup. I don't follow AMD's patches nor do I look at the driver sites for the AMD series of MOBO's. I would not have anything but a passing interest to see how AMD processors these days are faring. So if the AMD bugs have been fixed that is GREAT news, is it not for any AMD users.

    I am running my lappies and desktops with Intel CPUs these days and intend to stick with it and it's supporting mobo's and chipsets, and go for the I9 xe on my next rig. I can't risk nor afford a waste of time for a CPU lockup crash. Intel CPU's have had its SkyLake processors mysteriously lockup as well.

    Who has the best track record? Certainly the 'processor wars' will get a lot of traction in discussion, "my benchmark is better than yours, etc.."

    AMD sure costs less that's for sure, but for me lockups cost me time and failed renderings and a lot of frustration.

    Intel for me has been more reliable. If I could do clusters with windows and Intel CPU's I'd do that as my software (sigh) is tied at the hip to windows. No doubt with the CPU security holes, my new rig will never touch a live 'outside' network, probably a good practice.
    Last edited by Bob; 23rd November 2017 at 16:55.

+ Reply to Thread

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts