Major Intel CPU vulnerability
-
Don't get too excited. You'll probably have performance issues (:winking_face: lol) post patch but it's probably not permanent.
https://www.itnews.com.au/news/meltdown-and-spectre-fix-will-slow-down-machines-480794
Enterprise and business customers may have to choose between applying the Meltdown and Spectre fixes, or carefully evaluating what code they are running on their systems, since Microsoft's Windows Server operating system will slow down significantly with the security mitigations applied.
ย
Microsoft explained that older versions of Windows have more user-kernel transitions "because of legacy design decisions" and will suffer a larger performance hit when the Meltdown and Spectre fixes are applied, compared to Windows 10.
ย
For instance, on Windows 7 and Windows 8, all font rendering takes place in the operating system kernel, Microsoft said.Also, http://www.theregister.co.uk/2018/01/09/meltdown_spectre_slowdown/
Intel said as much in its statement, claiming "any performance impacts are workload-dependent, and, for the average computer user, should not be significant and will be mitigated over time."
ย
That may be true eventually, thanks in part to a processor feature called Processor-Context ID, or PCID.
^ the PCID section of that article has some useful information -
@dbeato said in Major Intel CPU vulnerability:
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
That's my upcoming weekend...
Doing Updates now on my end. Shouldn't be too long.
I have 2x locations, but luckily the colo is right next to one of the best ramen places in town. Lots of driving, but I get to have awesome noodles.
Nice, I am working from home so it is not glamorous but very calm.
Wana trade?
No! Gotta take care of the kids but I wouldn't mind going to Colocation every so often
Kids? No trade!!!!
It is nice to drive over to the colo, because they tell me to go early afternoon and they pay me for the rest of the day. And I get ramen.
-
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
That's my upcoming weekend...
@RojoLoco I am on a sabbatical from posting but did not want to mislead you, if your R720 has 2.5.4 BIOS then there is no other update yet. Anyone with Hyper V Also should update the integration services as well after the Microsoft Update.
I am out.
-
@dbeato said in Major Intel CPU vulnerability:
@rojoloco said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
That's my upcoming weekend...
@RojoLoco I am on a sabbatical from posting but did not want to mislead you, if your R720 has 2.5.4 BIOS then there is no other update yet. Anyone with Hyper V Also should update the integration services as well after the Microsoft Update.
I am out.
What? you're talking a vacation from posting with us? oh no.....
-
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
I don't see the R520 BIOS Updates. It is still showing 2.4.2 from 2016 in Drivers and Downloads. Is there another place I need to look?
-
-
@pmoncho said in Major Intel CPU vulnerability:
@dbeato said in Major Intel CPU vulnerability:
Finally Dell R720, R520 are getting BIOS updates.
I don't see the R520 BIOS Updates. It is still showing 2.4.2 from 2016 in Drivers and Downloads. Is there another place I need to look?
No, as I stated before I jumped the gun, the update will be available 2/1/2018
http://www.dell.com/support/article/us/en/04/SLN308588/en
and 11G servers will be next month as well. -
@scottalanmiller said in Major Intel CPU vulnerability:
Given that we already know that the plan came AFTER it was already insider trading
You have yet to prove this statement. Nothing else you have said matters until you show proof.
@StorageNinja on the otherhand clearly showed proof that is was.
-
@jaredbusch said in Major Intel CPU vulnerability:
@scottalanmiller said in Major Intel CPU vulnerability:
Given that we already know that the plan came AFTER it was already insider trading
You have yet to prove this statement. Nothing else you have said matters until you show proof.
@StorageNinja on the otherhand clearly showed proof that is was.
How did he show proof? I've seen nothing of the kind yet.
-
@storageninja said in Major Intel CPU vulnerability:
@scottalanmiller said in Major Intel CPU vulnerability:
Pretty cut and dry insider trading, I wonder how much of hiding this flaw from the public was solely to hide the insider trading?
" To avoid charges of trading on insider knowledge, executives often put in place plans that automatically sell a portion of their stock holdings or exercise some of their options on a predetermined schedule, typically referred to as Rule 10b5-1(c) trading plans. According to an SEC filing, the holdings that Krzanich sold in November โ 245,743 shares of stock he owned outright and 644,135 shares he got from exercising his options โ were divested under just such a trading plan.
But Krzanich put that plan in place only on October 30, according to the filing. "
The plan was created in 2015 per Bloomberg.
You can also see the history of transactions here.Since the plan was set up, Krzanich has had a common trading pattern. In February, he gets his equity payout under Intelโs performance-based incentive plan. For fiscal years 2015, 2016 and 2017, he received 89,581, 87,061 and 278,868 shares, respectively. Then in the last quarter of each of those years, he makes sales that are proportionate to the awards he got. In the last quarter of 2015, he sold 70,000 and in 2016 he sold more than 50,000. And this year, the sale was much larger in light of the large payout he got in February.
Looks like he traded on 11/29.
Market Close was at $43.95 that day. Market Close today is $44.74 today. I expect Intel shares to go up as people realize public clouds need to buy 20% more compute this quarter (and it's too late to qualify to move those workloads to ARM/AMD systems, nor can AMD/GF handle an order that large).While I know insider trading doesn't require you actually make money off of it, I'd argue he missed out on gains by not waiting to sell until now. Intel is clearly fine, and while this is painful for a lot of people who have to go do patching, the market isn't punishing Intel in any serious way.
Note: the stock has doubled under Brian as CEO. This design decision was made in 1995 (well technically earlier given how long it takes to get something out the door).
Equifax is different in that their trades were NOT scheduled. Those yahoos are going to jail or to pay a token fine and promise not to do it again.
Also, EqualFax has only recovered 1/2 of its losses from the breach.Full SEC yadayadayada disclaimer, I hold no Intel, but am considering a long position in the near future.
This above is not "proof" in any way as equal sources say that a NEW trading plan was put in place and the one from 2015 was not followed. Which we know from observation, as the results weren't part of the pattern. Everything we know from sources after this is that this article was mistaken and had bad info that skipped that the NEW plan was AFTER the chip issue was known and that there WASN'T a pattern followed. Which is obvious, has he never did what he did before, ever.
-
The filing showed that the sales were part of a 10b5-1 plan, which was created on Oct. 30, just a month before Krzanich sold the shares. The 10b5-1 is a trading plan that company executives set up to sell stocks they own at a pre-determined time so that they are not accused of insider trading.
The reports about a 2015 plan appear to be misdirection to make people miss that there was a replacement plan put in place months after he know about the chip flaw. How much "proof" do you want? The "proof" that @StorageNinja isn't proof at all and relies solely on information like this not arising. That there was "a plan" before hand is a red herring.
-
One month before does not make an SEC pattern. This wasn't just not a pattern, it was basically a single transaction.
-
I really like the sources WordFence / Defiant uses:
-
-
-
Fedora and Spectre update: https://fedoramagazine.org/update-ongoing-meltdown-spectre-work/
-
Easily examine and understand any Windows system's hardware and software capability to
prevent Meltdown and Spectre attacks. -
@danp said in Major Intel CPU vulnerability:
Easily examine and understand any Windows system's hardware and software capability to
prevent Meltdown and Spectre attacks.Anyone tried this?
-
@ambarishrh said in Major Intel CPU vulnerability:
@danp said in Major Intel CPU vulnerability:
Easily examine and understand any Windows system's hardware and software capability to
prevent Meltdown and Spectre attacks.Anyone tried this?
Took a look at the laptop I was working on today with it. Found out it hadn't applied the latest updates, and it had the correct status and explanation both times I ran it.
Steve Gibson is a software guy, not a security specialist (obviously), he normally writes good programs/utilities.
-
@ambarishrh said in Major Intel CPU vulnerability:
@danp said in Major Intel CPU vulnerability:
Easily examine and understand any Windows system's hardware and software capability to
prevent Meltdown and Spectre attacks.Anyone tried this?
Yep. I have on a Dell R230 and R620. It correctly identified that the R230 was fully updated and as patched as possible, and that the R620 was still waiting for the microcode and bios update from Dell. Nice and easy for validation once you've applied your patches and updates.