Major Intel CPU vulnerability
-
Does anybody know if Dell have released firmware for T630 server for the hardware? I cant seem to find that info on Dells site...
-its ok, think I've found it, and its this... Update
-
@jimmy9008 said in Major Intel CPU vulnerability:
Does anybody know if Dell have released firmware for T630 server for the hardware? I cant seem to find that info on Dells site...
-its ok, think I've found it, and its this... Update
Damn, on the bleeding edge on that one.
I looked for some HP things yesterday - nada.
I'm guessing by the end of January, we'll start seeing more firmware updates.
Now the question is, how far back are the vendors going to go?
-
@dashrender said in Major Intel CPU vulnerability:
@jimmy9008 said in Major Intel CPU vulnerability:
Does anybody know if Dell have released firmware for T630 server for the hardware? I cant seem to find that info on Dells site...
-its ok, think I've found it, and its this... Update
Damn, on the bleeding edge on that one.
I looked for some HP things yesterday - nada.
I'm guessing by the end of January, we'll start seeing more firmware updates.
Now the question is, how far back are the vendors going to go?
The new generation Servers are being patched faster at least by Dell. -
HMMM... —
Intel CEO sold all the stock he could after Intel learned of security bugI literally quoted the title as it says everything I could. . .
-
@dustinb3403 said in Major Intel CPU vulnerability:
HMMM... —
Intel CEO sold all the stock he could after Intel learned of security bugI literally quoted the title as it says everything I could. . .
That sounds suspiciously like insider trading.
-
@coliver That is why an investigation appears to be prepared in this.
-
@coliver said in Major Intel CPU vulnerability:
@dustinb3403 said in Major Intel CPU vulnerability:
HMMM... —
Intel CEO sold all the stock he could after Intel learned of security bugI literally quoted the title as it says everything I could. . .
That sounds suspiciously like insider trading.
hard to say.. the whole Scheduled for sale thing will be the key.
-
@dashrender said in Major Intel CPU vulnerability:
@coliver said in Major Intel CPU vulnerability:
@dustinb3403 said in Major Intel CPU vulnerability:
HMMM... —
Intel CEO sold all the stock he could after Intel learned of security bugI literally quoted the title as it says everything I could. . .
That sounds suspiciously like insider trading.
hard to say.. the whole Scheduled for sale thing will be the key.
Scheduled for sale after Intel management knew about the issue for over 5 months and before it was disclosed publicly that there was any issue.
Even if he made the same amount of capital from the sale as if he sold today it's still protecting "his" money.
-
@coliver said in Major Intel CPU vulnerability:
@dustinb3403 said in Major Intel CPU vulnerability:
HMMM... —
Intel CEO sold all the stock he could after Intel learned of security bugI literally quoted the title as it says everything I could. . .
That sounds suspiciously like insider trading.
And by suspiciously like, more like exactly like.
-
-
"The bad news is that the Kernel Page Table Isolation fix makes everything run slower on Intel x86 processors".
So does this not affect 64bit processors?
-
@irj said in Major Intel CPU vulnerability:
This might be the worst vulnerability we've seen to date...
You can plan for patching and maintenance. You cannot plan for unexpectedly losing resources. Can you imagine how many cloud providers this is going to affect. They share so many services across so many servers, I doubt they could afford to take a 30% resource hit. It could take down their whole environment.
I thought I read the performance hit only effects 32-bit processors? Did I read that wrong?
-
Seems like I saw a write-up on it, and it only made a couple of things significantly slower (at least in Linux).
-
@fredtx said in Major Intel CPU vulnerability:
"The bad news is that the Kernel Page Table Isolation fix makes everything run slower on Intel x86 processors".
So does this not affect 64bit processors?
Fingers crossed. But if that is the case, why does anyone care?
-
@tim_g said in Major Intel CPU vulnerability:
@irj said in Major Intel CPU vulnerability:
This might be the worst vulnerability we've seen to date...
You can plan for patching and maintenance. You cannot plan for unexpectedly losing resources. Can you imagine how many cloud providers this is going to affect. They share so many services across so many servers, I doubt they could afford to take a 30% resource hit. It could take down their whole environment.
I thought I read the performance hit only effects 32-bit processors? Did I read that wrong?
Pretty sure, as I've seen vendors discussion the performance hits on purely 64bit systems.
-
@scottalanmiller said in Major Intel CPU vulnerability:
@tim_g said in Major Intel CPU vulnerability:
@irj said in Major Intel CPU vulnerability:
This might be the worst vulnerability we've seen to date...
You can plan for patching and maintenance. You cannot plan for unexpectedly losing resources. Can you imagine how many cloud providers this is going to affect. They share so many services across so many servers, I doubt they could afford to take a 30% resource hit. It could take down their whole environment.
I thought I read the performance hit only effects 32-bit processors? Did I read that wrong?
Pretty sure, as I've seen vendors discussion the performance hits on purely 64bit systems.
Meltdown's impact indeed is on 64 bit systems.
https://access.redhat.com/articles/3307751
*Measureable: 8-19% - Highly cached random memory, with buffered I/O, OLTP database workloads, and benchmarks with high kernel-to-user space transitions are impacted between 8-19%. Examples include OLTP Workloads (tpc), sysbench, pgbench, netperf (< 256 byte), and fio (random I/O to NvME).
Modest: 3-7% - Database analytics, Decision Support System (DSS), and Java VMs are impacted less than the “Measurable” category. These applications may have significant sequential disk or network traffic, but kernel/device drivers are able to aggregate requests to moderate level of kernel-to-user transitions. Examples include SPECjbb2005, Queries/Hour and overall analytic timing (sec).*
Note on the virtualization front I can't speak to if KVM or Xen will carry compounding overheads with the guest OS overheads. (ESXi so far is the only Hypervisor reporting as unaffected by Meltdown).
-
@dustinb3403 said in Major Intel CPU vulnerability:
It takes 3 seconds to look at his stock trades and see the pattern, and another 5 minutes to see that he filed paperwork for this plan back in 2015
At the end of Q4 he sells his awards. Nothing to see here fake news from the internet mob who's too lazy to learn basic finance skills.
-
@storageninja said in Major Intel CPU vulnerability:
@dustinb3403 said in Major Intel CPU vulnerability:
It takes 3 seconds to look at his stock trades and see the pattern, and another 5 minutes to see that he filed paperwork for this plan back in 2015
At the end of Q4 he sells his awards. Nothing to see here fake news from the internet mob who's too lazy to learn basic finance skills.
Perhaps he knew of this in 2015... relevant to question that at least.
-
@tim_g said in Major Intel CPU vulnerability:
@storageninja said in Major Intel CPU vulnerability:
@dustinb3403 said in Major Intel CPU vulnerability:
It takes 3 seconds to look at his stock trades and see the pattern, and another 5 minutes to see that he filed paperwork for this plan back in 2015
At the end of Q4 he sells his awards. Nothing to see here fake news from the internet mob who's too lazy to learn basic finance skills.
Perhaps he knew of this in 2015... relevant to question that at least.
That's certainly possible and scary.
-
I really don't know what to believe at quick glance. This article is saying it is across all CPUs, including AMD and ARM, not just Intel: