• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

Intel Issues Updates to Protect Systems From Security Exploits

btarunr

Editor & Senior Moderator
Staff member
Joined
Oct 9, 2007
Messages
47,291 (7.53/day)
Location
Hyderabad, India
System Name RBMK-1000
Processor AMD Ryzen 7 5700G
Motherboard ASUS ROG Strix B450-E Gaming
Cooling DeepCool Gammax L240 V2
Memory 2x 8GB G.Skill Sniper X
Video Card(s) Palit GeForce RTX 2080 SUPER GameRock
Storage Western Digital Black NVMe 512GB
Display(s) BenQ 1440p 60 Hz 27-inch
Case Corsair Carbide 100R
Audio Device(s) ASUS SupremeFX S1220A
Power Supply Cooler Master MWE Gold 650W
Mouse ASUS ROG Strix Impact
Keyboard Gamdias Hermes E2
Software Windows 11 Pro
Intel has developed and is rapidly issuing updates for all types of Intel-based computer systems -- including personal computers and servers -- that render those systems immune from both exploits (referred to as "Spectre" and "Meltdown") reported by Google Project Zero. Intel and its partners have made significant progress in deploying updates as both software patches and firmware updates.

Intel has already issued updates for the majority of processor products introduced within the past five years. By the end of next week, Intel expects to have issued updates for more than 90 percent of processor products introduced within the past five years. In addition, many operating system vendors, public cloud service providers, device manufacturers and others have indicated that they have already updated their products and services.



Intel continues to believe that the performance impact of these updates is highly workload-dependent and, for the average computer user, should not be significant and will be mitigated over time. While on some discrete workloads the performance impact from the software updates may initially be higher, additional post-deployment identification, testing and improvement of the software updates should mitigate that impact.

System updates are made available by system manufacturers, operating system providers and others.

Intel will continue to work with its partners and others to address these issues, and Intel appreciates their support and assistance. Intel encourages computer users worldwide to utilize the automatic update functions of their operating systems and other computer software to ensure their systems are up-to-date.

View at TechPowerUp Main Site
 
Joined
Dec 11, 2010
Messages
39 (0.01/day)
System Name NotAPotatoPC
Processor AMD Ryzen 5 5600G
Motherboard MSI B450 Gaming Plus
Cooling EVGA CLC 280MM
Memory 32 GB Corsair Vengeance DDR4 2400
Video Card(s) RTX 3080 FE
Storage A lot for just gaming... 1 TB SSD & 10 TB HDD
Display(s) Samsung CF591
Case Corsair Carbide
Audio Device(s) Corsair HS70 Bluetooth
Power Supply EVGA 850w Bronze
Mouse Hyper X Pulsefire Pro
Keyboard HyperX Alloy Origins Core
Software Windows 11
Benchmark Scores https://hwbot.org/user/figuretti
Joined
Feb 18, 2005
Messages
5,847 (0.81/day)
Location
Ikenai borderline!
System Name Firelance.
Processor Threadripper 3960X
Motherboard ROG Strix TRX40-E Gaming
Cooling IceGem 360 + 6x Arctic Cooling P12
Memory 8x 16GB Patriot Viper DDR4-3200 CL16
Video Card(s) MSI GeForce RTX 4060 Ti Ventus 2X OC
Storage 2TB WD SN850X (boot), 4TB Crucial P3 (data)
Display(s) 3x AOC Q32E2N (32" 2560x1440 75Hz)
Case Enthoo Pro II Server Edition (Closed Panel) + 6 fans
Power Supply Fractal Design Ion+ 2 Platinum 760W
Mouse Logitech G602
Keyboard Razer Pro Type Ultra
Software Windows 10 Professional x64
The problem I have with this statement is "within the past five years". Since Sandy and Ivy Bridge are older than that, does this mean Intel won't be releasing fixed microcode for those processor families (assuming they are vulnerable)?

If that is the case, terrible decision on Intel's part considering the massive number of people (including myself) still using SNB/IVB rigs. If their plan is to force those owners to upgrade, then congrats Intel, you just gave AMD another customer.
 
Joined
Sep 15, 2011
Messages
6,759 (1.40/day)
Processor Intel® Core™ i7-13700K
Motherboard Gigabyte Z790 Aorus Elite AX
Cooling Noctua NH-D15
Memory 32GB(2x16) DDR5@6600MHz G-Skill Trident Z5
Video Card(s) ZOTAC GAMING GeForce RTX 3080 AMP Holo
Storage 2TB SK Platinum P41 SSD + 4TB SanDisk Ultra SSD + 500GB Samsung 840 EVO SSD
Display(s) Acer Predator X34 3440x1440@100Hz G-Sync
Case NZXT PHANTOM410-BK
Audio Device(s) Creative X-Fi Titanium PCIe
Power Supply Corsair 850W
Mouse Logitech Hero G502 SE
Software Windows 11 Pro - 64bit
Benchmark Scores 30FPS in NFS:Rivals
Are those updates going to slow down the CPUs as well?? Serious question.
 
Joined
Oct 2, 2004
Messages
13,791 (1.87/day)
What kind of update? Driver? Windows update? BIOS update? If it's the first two, which ones, where and when? If BIOS, that means most systems will never get them because it then falls down to motherboard/OEM makers and they generally don't release BIOS updates for anything after 2 years of life of any product go by.
 
Joined
Mar 23, 2016
Messages
4,844 (1.52/day)
Processor Core i7-13700
Motherboard MSI Z790 Gaming Plus WiFi
Cooling Cooler Master RGB something
Memory Corsair DDR5-6000 small OC to 6200
Video Card(s) XFX Speedster SWFT309 AMD Radeon RX 6700 XT CORE Gaming
Storage 970 EVO NVMe M.2 500GB,,WD850N 2TB
Display(s) Samsung 28” 4K monitor
Case Phantek Eclipse P400S
Audio Device(s) EVGA NU Audio
Power Supply EVGA 850 BQ
Mouse Logitech G502 Hero
Keyboard Logitech G G413 Silver
Software Windows 11 Professional v23H2
If BIOS, that means most systems will never get them because it then falls down to motherboard/OEM makers and they generally don't release BIOS updates for anything after 2 years of life of any product go by.
There is the possibility of Microsoft pushing out Intel's required microcode updates through Windows Update similar too Linux. The microcode update gets applied earlier in the boot phase.

It's happened in the past for older Intel Processors running under Windows 7.
 
Joined
Oct 2, 2004
Messages
13,791 (1.87/day)
There is the possibility of Microsoft pushing out Intel's required microcode updates through Windows Update similar too Linux. It's happened in the past for older Intel Processors running under Windows 7.

But can they in this case and what do they actually fix? It's a lot of talk what all is vulnerable and that patches are being released yet no one posts a clear cut info on what exactly is flawed and what exactly is being patched, how and when. Coz that's what we want to know.
 
Joined
Jun 30, 2008
Messages
333 (0.06/day)
There is the possibility of Microsoft pushing out Intel's required microcode updates through Windows Update similar too Linux. The microcode update gets applied earlier in the boot phase.

It's happened in the past for older Intel Processors running under Windows 7.

There was a Windows 10 update yesterday that Microsoft pushed through and I can swear my machine now feels a little sluggish and slower as result! The name of this update was the 1709 cumulative update. Details stated it fixed mouse and keyboard issues but it took a few minutes to install so you can bet there was a whole lot more ‘fixes’ in there..
 
Joined
Apr 14, 2016
Messages
288 (0.09/day)
The problem I have with this statement is "within the past five years". Since Sandy and Ivy Bridge are older than that, does this mean Intel won't be releasing fixed microcode for those processor families (assuming they are vulnerable)?

If that is the case, terrible decision on Intel's part considering the massive number of people (including myself) still using SNB/IVB rigs. If their plan is to force those owners to upgrade, then congrats Intel, you just gave AMD another customer.

Honest, i don't even know why people are so "OMG, i'm vunerable", most of people has boring stuff in their laptops anyway haha
 
Joined
Feb 18, 2005
Messages
5,847 (0.81/day)
Location
Ikenai borderline!
System Name Firelance.
Processor Threadripper 3960X
Motherboard ROG Strix TRX40-E Gaming
Cooling IceGem 360 + 6x Arctic Cooling P12
Memory 8x 16GB Patriot Viper DDR4-3200 CL16
Video Card(s) MSI GeForce RTX 4060 Ti Ventus 2X OC
Storage 2TB WD SN850X (boot), 4TB Crucial P3 (data)
Display(s) 3x AOC Q32E2N (32" 2560x1440 75Hz)
Case Enthoo Pro II Server Edition (Closed Panel) + 6 fans
Power Supply Fractal Design Ion+ 2 Platinum 760W
Mouse Logitech G602
Keyboard Razer Pro Type Ultra
Software Windows 10 Professional x64
Honest, i don't even know why people are so "OMG, i'm vunerable", most of people has boring stuff in their laptops anyway haha

Like their bank details and cryptocurrency wallets?
 
Joined
Jan 11, 2005
Messages
1,491 (0.20/day)
Location
66 feet from the ground
System Name 2nd AMD puppy
Processor FX-8350 vishera
Motherboard Gigabyte GA-970A-UD3
Cooling Cooler Master Hyper TX2
Memory 16 Gb DDR3:8GB Kingston HyperX Beast + 8Gb G.Skill Sniper(by courtesy of tabascosauz &TPU)
Video Card(s) Sapphire RX 580 Nitro+;1450/2000 Mhz
Storage SSD :840 pro 128 Gb;Iridium pro 240Gb ; HDD 2xWD-1Tb
Display(s) Benq XL2730Z 144 Hz freesync
Case NZXT 820 PHANTOM
Audio Device(s) Audigy SE with Logitech Z-5500
Power Supply Riotoro Enigma G2 850W
Mouse Razer copperhead / Gamdias zeus (by courtesy of sneekypeet & TPU)
Keyboard MS Sidewinder x4
Software win10 64bit ltsc
Benchmark Scores irrelevant for me
i think is not a flaw but a NSA "feature" implemented from the start...

now when all went public all involved exposed parts patch the disclosed issues...

i bet there are more undisclosed implemented vulnerabilities, which are used by agencies for data collection, undetected by anyone...
 
Joined
Jun 30, 2008
Messages
333 (0.06/day)
Re
i think is not a flaw but a NSA "feature" implemented from the start...

now when all went public all involved exposed parts patch the disclosed issues...

i bet there are more undisclosed implemented vulnerabilities, which are used by agencies for data collection, undetected by anyone...

I agree. Sounds like a NSA backdoor. Reminds of the Black Mirror Face the Nation episode almost!
 

Frick

Fishfaced Nincompoop
Joined
Feb 27, 2006
Messages
19,661 (2.86/day)
Location
Piteå
System Name Black MC in Tokyo
Processor Ryzen 5 7600
Motherboard MSI X670E Gaming Plus Wifi
Cooling Be Quiet! Pure Rock 2
Memory 2 x 16GB Corsair Vengeance
Video Card(s) XFX 6950XT Speedster MERC 319
Storage Kingston KC3000 1TB | WD Black SN750 2TB |WD Blue 1TB x 2 | Toshiba P300 2TB | Seagate Expansion 8TB
Display(s) Samsung U32J590U 4K + BenQ GL2450HT 1080p
Case Fractal Design Define R4
Audio Device(s) Plantronics 5220, Nektar SE61 keyboard
Power Supply Corsair RM850x v3
Mouse Logitech G602
Keyboard Dell SK3205
Software Windows 11 Pro
Benchmark Scores Rimworld 4K ready!
i think is not a flaw but a NSA "feature" implemented from the start...

now when all went public all involved exposed parts patch the disclosed issues...

i bet there are more undisclosed implemented vulnerabilities, which are used by agencies for data collection, undetected by anyone...

Except that it's related to something very fundemental in CPU design. Like the 90s fundemental.
 
Joined
Jun 30, 2008
Messages
333 (0.06/day)
Some guy in tech thread I follow posted this:

And I quote user JC for short:

"
It's really hard for me to call this a bug. These people didn't go
"read" kernel memory, in any traditional sense. They used detailed
knowledge of the architecture and cache behavior, and some very clever
statistical analysis of the resulting timing, to intuit the value of
individual bits in otherwise inaccessible memory. This strikes me as
the same kind of attack as the people who "cracked" RSA by measuring the
CPU's voltage consumption during the encoding process and intuiting the
plaintext by the path through the code.

"

IE this was no bug but a major NSA level hack!!!

Thank you WikiLeaks!! Slowed all our machines!!!

Burn in hell!!!
 
Joined
Sep 17, 2014
Messages
22,644 (6.04/day)
Location
The Washing Machine
System Name Tiny the White Yeti
Processor 7800X3D
Motherboard MSI MAG Mortar b650m wifi
Cooling CPU: Thermalright Peerless Assassin / Case: Phanteks T30-120 x3
Memory 32GB Corsair Vengeance 30CL6000
Video Card(s) ASRock RX7900XT Phantom Gaming
Storage Lexar NM790 4TB + Samsung 850 EVO 1TB + Samsung 980 1TB + Crucial BX100 250GB
Display(s) Gigabyte G34QWC (3440x1440)
Case Lian Li A3 mATX White
Audio Device(s) Harman Kardon AVR137 + 2.1
Power Supply EVGA Supernova G2 750W
Mouse Steelseries Aerox 5
Keyboard Lenovo Thinkpad Trackpoint II
VR HMD HD 420 - Green Edition ;)
Software W11 IoT Enterprise LTSC
Benchmark Scores Over 9000
Some guy in tech thread I follow posted this:

And I quote user JC for short:

"
It's really hard for me to call this a bug. These people didn't go
"read" kernel memory, in any traditional sense. They used detailed
knowledge of the architecture and cache behavior, and some very clever
statistical analysis of the resulting timing, to intuit the value of
individual bits in otherwise inaccessible memory. This strikes me as
the same kind of attack as the people who "cracked" RSA by measuring the
CPU's voltage consumption during the encoding process and intuiting the
plaintext by the path through the code.

"

IE this was no bug but a major NSA level hack!!!

Thank you WikiLeaks!! Slowed all our machines!!!

Burn in hell!!!

Not sure if trolling or just outright stupid.

Can you even read the piece you just quoted? You sure as hell don't understand what it says.
 
Joined
Oct 30, 2008
Messages
1,901 (0.32/day)
Processor 5930K
Motherboard MSI X99 SLI
Cooling WATER
Memory 16GB DDR4 2132
Video Card(s) EVGAY 2070 SUPER
Storage SEVERAL SSD"S
Display(s) Catleap/Yamakasi 2560X1440
Case D Frame MINI drilled out
Audio Device(s) onboard
Power Supply Corsair TX750
Mouse DEATH ADDER
Keyboard Razer Black Widow Tournament
Software W10HB
Benchmark Scores PhIlLyChEeSeStEaK
Not sure if trolling or just outright stupid.

Can you even read the piece you just quoted? You sure as hell don't understand what it says.

Whats so hard to understand, its pretty easy to think that this might have been implemented on purpose then they pretend "oh we have a vulnerability" in the back door cause some one got caught? Or even the fix could be a back door opener.
I respect WIKI LEAKS as they released the video "Collateral Murder", and the day to day logs of the second gulf war, you could basically see how many people were killed per day and if they were friendly or enemy or civilian. Its a real eye opener for people who never been to a war. To think a Gov. doesn't spy on it's people, is to be pretty doped up.
 
Joined
Sep 17, 2014
Messages
22,644 (6.04/day)
Location
The Washing Machine
System Name Tiny the White Yeti
Processor 7800X3D
Motherboard MSI MAG Mortar b650m wifi
Cooling CPU: Thermalright Peerless Assassin / Case: Phanteks T30-120 x3
Memory 32GB Corsair Vengeance 30CL6000
Video Card(s) ASRock RX7900XT Phantom Gaming
Storage Lexar NM790 4TB + Samsung 850 EVO 1TB + Samsung 980 1TB + Crucial BX100 250GB
Display(s) Gigabyte G34QWC (3440x1440)
Case Lian Li A3 mATX White
Audio Device(s) Harman Kardon AVR137 + 2.1
Power Supply EVGA Supernova G2 750W
Mouse Steelseries Aerox 5
Keyboard Lenovo Thinkpad Trackpoint II
VR HMD HD 420 - Green Edition ;)
Software W11 IoT Enterprise LTSC
Benchmark Scores Over 9000
Vayra86 Relax. Go have a beer or something. Not everything is meant to be taken literally. God almighty..

You came off quite serious in your statements, I never spotted an /s for sarcasm either.

Also when you first post

Re


I agree. Sounds like a NSA backdoor. Reminds of the Black Mirror Face the Nation episode almost!

And then follow up with a quote... how are you not being serious?

Really man, if this is your style, we have 4chan for that BS. Don't spread it here.

Now you're even deleting your post. ???
 
Last edited:
Top