Part numbers of CPU's without the meltdown and spectre bugs?

Page 5 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

imported_ats

Senior member
Mar 21, 2008
422
63
86
It should be obvious intel CPUs are not working as designed or intended. They were intended and designed to not allow lower level processes to access privileged data. They missed something and that means the CPUs have a bug.

Um, they don't allow lower privileged processes to access higher privileged data. If they did, a side channel attack wouldn't be required. This definitely falls into the exploit category and not the bug category.

Spectre as an exploit targets a particular architectural decision (OoO, speculative processing). Which isn't a bug, is a general security issue that needs to be resolved.

Meltdown is an exploit that targets a specific bug or design deficit on Intel processors. Intel CPU's are not doing what they are supposed to be doing and Meltdown takes advantage of that.

Both Meltdown and Spectre are exploits that target speculative execution. Meltdown is not the result of a specific bug OR design deficit. Intel CPUs are doing what they are suppose to due. They are susceptible to a side channel exploit like a wide range of designs from multiple vendors using multiple ISAs.


Yeah. No. The CPUs are not working as intended. The CPUs are intended to prevent code accessing privileged data.

Which they do. Anyone saying they don't is simply lying. Side channel attacks exist specifically because the CPU is preventing code from accessing privileged data, if the CPU wasn't doing the right thing, a side channel attack wouldn't be required.


In regards to Meltdown. It would not exist if Intel CPU's unlike did what it was supposed to when verifying memory access permissions after the code has been processed. It should do a check notice the discrepancy and chuck it. That is what the check is for. That is what all other CPU's do. Whether it was an intentional choice by an engineer when realizing it was doing what it was supposed to do, a design decision by Intel to ignore the security check for performance, or it was just an oversight because when this was originally done, there wasn't really an attack vector that could utilize it anyways, there is a design feature included in the CPU that doesn't handle it's job correctly. That is a bug and not a CPU doing what it is supposed but a new exploit takes advantage of that.

They do do a check and notice the discrepancy and chunk it. They work like almost all other speculative OOO CPUs. There is literally only 1 CPU that does speculative OOO execution and doesn't do it like Intel and that is zen and that wasn't to prevent some bug, that was a power optimization. Power? Same thing as Intel. All other AMD OOO designs? Same thing as Intel. Alpha? Same thing as Intel. MIPS? Same thing as Intel. ARM? Same thing as Intel. Literally every OOO design except Zen has the meltdown issue.


Intel doesn't have any security checks for cache data read tasks.
Intel has security checks in place but the CPU ignores those checks for whatever reason.

These are categorically false statements.
 

Thala

Golden Member
Nov 12, 2014
1,355
653
136
ARM? Same thing as Intel. Literally every OOO design except Zen has the meltdown issue.

In ARMs long list of OOO designs, there is only Cortex A75 affected by Meltdown. So your statement is wrong.

In addition, contrary to Spectre, the Meltdown attack is relatively easy to avoid in HW. Part of the reason is, that access privileges are know very early in the data access process. This holds in particular as Meltdown requires an additional data dependency on invalid data in order to leak the information via side channels.
On the other hand, control flow speculation as required by Spectre cannot trivially be avoided without degrading performance, since the evaluation of branch condition happens relatively late.
 

jihe

Senior member
Nov 6, 2009
747
97
91
No, the CPUs are working as intended, imo. This is not a bug. Someone has just found a way to exploit the way the CPU normally works. That's the way I look at it.
I think we just disagree, and this disagreement is reasonable.
And all CPUs can be exploited.
Some exploits just haven't been discovered yet, or made public yet.

You sound more and more like Apple. Just call it a feature and be done with it.
 

2blzd

Senior member
May 16, 2016
318
41
91
Im sure I will get roasted for saying this, but why is everyone so paranoid. A hacker has to specifically target you correct?
 

Tuna-Fish

Golden Member
Mar 4, 2011
1,421
1,755
136
Im sure I will get roasted for saying this, but why is everyone so paranoid. A hacker has to specifically target you correct?

Not really. When operating systems have had flaws of this magnitude in the past, they have typically lead to self-propagating worms that attack the entire installed base.

At least some of these bugs are exploitable from javascript, and with PoC and technical details available, it probably won't be long before the first internet-based attacks where some ransomware or other crap infects any unpatched machines visiting the wrong site through their browser.
 
Reactions: 2blzd

Thala

Golden Member
Nov 12, 2014
1,355
653
136
You might want to read that document. A15, A57, and A72 are all affected by Variant 3a.

Variant 3a is made up by ARM. Please read the Meltdown Whitepaper, where it clearly states that Meltdown is attacking memory content, which variant 3a is not. In fact variant 3a is not even fixable with the common PTI/KAISER patches, which is fixing Meltdown vulnerability. The reason for this is, that Meltdown is attacking mapped kernel pages in user space, while again variant 3a is not.

ARM in their evaluation paper clearly say in reference to variant 3a:
In general, it is not believed that software mitigations for this issue are necessary.

So whatever you name variant 3a, it is not Meltdown.
In particular it is wrong claiming that that A15, A57, A72 are susceptible to Meltdown.
 
Last edited:

whm1974

Diamond Member
Jul 24, 2016
9,460
1,570
96
Not really. When operating systems have had flaws of this magnitude in the past, they have typically lead to self-propagating worms that attack the entire installed base.

At least some of these bugs are exploitable from javascript, and with PoC and technical details available, it probably won't be long before the first internet-based attacks where some ransomware or other crap infects any unpatched machines visiting the wrong site through their browser.
Goodbye JavaScript?
 

richaron

Golden Member
Mar 27, 2012
1,357
329
136
No, there are multiple chips from multiple vendor using multiple ISA that are vulnerable to at least all three major exploits that have been published.

Lol you are exactly the sort of person who bought into intel's spin but you don't understand my example of spin. Think about it. Nothing I said is wrong, I only referenced what was convenient and handled the scope of my statement. I didn't say it was the only exploit. I didn't say it was the only CPU. I didn't even say it was the only desktop affected by exploits which need to be fixed in software: I said "an exploit" and I am logically correct because I'm referring to something specific. Intel has pulled the same BS with their spin (but obviously to make themselves seem equally affected as everyone else lol)

Once again, it's completely true that:
Intel CPUs are the only desktop and datacentre CPUs affected by an exploit which needs to be fixed in software. This software fix causes up to 30% decrease in performance.
 

Tuna-Fish

Golden Member
Mar 4, 2011
1,421
1,755
136
Goodbye JavaScript?

According to firefox devs, it's possible to change their JS implementation to protect against this, so there are no future implications for JS.

The problem is all the old machines with crappy old unpatched browsers. Something like 4% of the browser market share is still held by IE.
 

SPBHM

Diamond Member
Sep 12, 2012
5,058
410
126
According to firefox devs, it's possible to change their JS implementation to protect against this, so there are no future implications for JS.

The problem is all the old machines with crappy old unpatched browsers. Something like 4% of the browser market share is still held by IE.

I think IE11 is still being supported and likely to be patched for this?!
 

DaveSimmons

Elite Member
Aug 12, 2001
40,730
670
126
According to firefox devs, it's possible to change their JS implementation to protect against this, so there are no future implications for JS.

The problem is all the old machines with crappy old unpatched browsers. Something like 4% of the browser market share is still held by IE.

Those people are vulnerable to 100+ existing, easier to use attack methods so they are already thoroughly infected without the need for any S&M.
 
Reactions: lightmanek

2blzd

Senior member
May 16, 2016
318
41
91
Not really. When operating systems have had flaws of this magnitude in the past, they have typically lead to self-propagating worms that attack the entire installed base.

At least some of these bugs are exploitable from javascript, and with PoC and technical details available, it probably won't be long before the first internet-based attacks where some ransomware or other crap infects any unpatched machines visiting the wrong site through their browser.

These exploits are possible via js running in web browsers, fyi.

Makes sense, thanks for being easy on me
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |