Follow @EthHackingNews |
Ubuntu has disabled Intel GPU security mitigations in an effort to improve graphics performance, despite potential security implications. The move promises up to a 20% performance boost, but users should exercise caution when disabling Spectre mitigations.
The world of computer security has been abuzz with the latest development from Ubuntu, a leading Linux distribution. In a move that has garnered attention from both enthusiasts and security experts, the Ubuntu development team has decided to disable security mitigations for Intel-based systems, in an effort to improve graphics performance.
As many may recall, Spectre attacks have been a major concern in recent years. These attacks, which were first discovered in 2018, take advantage of the speculative execution feature built into modern CPUs to leak sensitive data. In response, CPU manufacturers have implemented various patches and mitigations to address this issue.
However, these mitigations have come at a cost. Research has shown that they can degrade graphics processing performance by as much as 20 percent. This is particularly significant for users who rely on high-performance computing for tasks such as gaming and video editing.
The decision to disable Spectre GPU mitigations was made after consultation with Intel and Ubuntu's security teams. According to Shane McKee, a member of the Ubuntu development team, "After discussion between Intel and Canonical’s security teams, we are in agreement that Spectre no longer needs to be mitigated for the GPU at the Compute Runtime level."
This decision has been met with mixed reactions from experts and users alike. On one hand, the potential performance boost of up to 20 percent is significant, particularly for users who rely on high-end graphics cards.
On the other hand, there are concerns about the potential security implications of disabling these mitigations. As Graham Sutherland, an independent researcher, noted, "Nobody bothers attacking these vulns because it takes a lot of engineering time to implement attacks against them to any useful level of rigor, and getting any interesting data back outside very targeted scenarios is very unlikely."
However, demize, another researcher, cautioned that users should exercise caution when disabling Spectre mitigations. "From the user perspective it’s risk/reward too," they noted. "Probably don’t disable side-channel mitigations on multitenant servers."
Cryptography engineer Sophie Schmieg also weighed in on the decision. She noted that while the performance boost is significant, the cost to GPU performance may not be worth it for some users. "The system can effectively parallelize a lot more actions without requiring expensive synchronization points between the cores," she explained.
For those who will be affected by this change, Ubuntu has provided guidance on how to proceed. Users who run custom Linux kernels without Spectre GPU mitigations are advised to keep compute runtime level mitigations enabled. Additionally, users can build their own Compute Runtime with the NEO_DISABLE_MITIGATIONS=false flag added.
As the debate around this decision continues, one thing is clear: the world of computer security is constantly evolving, and decisions like these will continue to shape the future of our digital landscape.
Follow @EthHackingNews |