According to the company AMD, discovered in Intel’s new class of MDS-vulnerability does not affect the processors in its production.
We will remind, earlier this month became aware of the presence of the Intel chips vulnerabilities Zombieload, RIDL, Fallout and Store-to-Leak Forwarding associated with the mechanism of speculative execution. With their help, the attacker can in one degree or another to access data in various internal buffers of the CPU.
For vulnerabilities hotfixes were released, however, as the results of the tests, they significantly slow down the performance of Intel machines. According to the website Phoronix, after patches computers with enabled Hyper-threading of average start working is 16% slower. Moreover, Apple and Google called on its users for security purposes, completely disable the Hyper-threading on Intel machines. This step can reduce the productivity by 40-50%, depending on the application. Since the vulnerabilities do not affect AMD processors, install patches or disable simultaneous multi-threading (similar to the Hyper-threading in Intel) no need.
Mode of Hyper-threading is typically used for workstations and servers, and a large proportion of this market is necessary on Intel CPUs. As reported by Phoronix, after installing the patches for the new MDS-vulnerabilities in terms of performance the Core i7-8700 K approaches Ryzen 7 2700X.
Read more •••