Thursday, January 4th 2018
Intel Issues Updates to Protect Systems From Security Exploits
Intel has developed and is rapidly issuing updates for all types of Intel-based computer systems -- including personal computers and servers -- that render those systems immune from both exploits (referred to as "Spectre" and "Meltdown") reported by Google Project Zero. Intel and its partners have made significant progress in deploying updates as both software patches and firmware updates.
Intel has already issued updates for the majority of processor products introduced within the past five years. By the end of next week, Intel expects to have issued updates for more than 90 percent of processor products introduced within the past five years. In addition, many operating system vendors, public cloud service providers, device manufacturers and others have indicated that they have already updated their products and services.Intel continues to believe that the performance impact of these updates is highly workload-dependent and, for the average computer user, should not be significant and will be mitigated over time. While on some discrete workloads the performance impact from the software updates may initially be higher, additional post-deployment identification, testing and improvement of the software updates should mitigate that impact.
System updates are made available by system manufacturers, operating system providers and others.
Intel will continue to work with its partners and others to address these issues, and Intel appreciates their support and assistance. Intel encourages computer users worldwide to utilize the automatic update functions of their operating systems and other computer software to ensure their systems are up-to-date.
Intel has already issued updates for the majority of processor products introduced within the past five years. By the end of next week, Intel expects to have issued updates for more than 90 percent of processor products introduced within the past five years. In addition, many operating system vendors, public cloud service providers, device manufacturers and others have indicated that they have already updated their products and services.Intel continues to believe that the performance impact of these updates is highly workload-dependent and, for the average computer user, should not be significant and will be mitigated over time. While on some discrete workloads the performance impact from the software updates may initially be higher, additional post-deployment identification, testing and improvement of the software updates should mitigate that impact.
System updates are made available by system manufacturers, operating system providers and others.
Intel will continue to work with its partners and others to address these issues, and Intel appreciates their support and assistance. Intel encourages computer users worldwide to utilize the automatic update functions of their operating systems and other computer software to ensure their systems are up-to-date.
18 Comments on Intel Issues Updates to Protect Systems From Security Exploits
If that is the case, terrible decision on Intel's part considering the massive number of people (including myself) still using SNB/IVB rigs. If their plan is to force those owners to upgrade, then congrats Intel, you just gave AMD another customer.
It's happened in the past for older Intel Processors running under Windows 7.
security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
now when all went public all involved exposed parts patch the disclosed issues...
i bet there are more undisclosed implemented vulnerabilities, which are used by agencies for data collection, undetected by anyone...
And I quote user JC for short:
"
It's really hard for me to call this a bug. These people didn't go
"read" kernel memory, in any traditional sense. They used detailed
knowledge of the architecture and cache behavior, and some very clever
statistical analysis of the resulting timing, to intuit the value of
individual bits in otherwise inaccessible memory. This strikes me as
the same kind of attack as the people who "cracked" RSA by measuring the
CPU's voltage consumption during the encoding process and intuiting the
plaintext by the path through the code.
"
IE this was no bug but a major NSA level hack!!!
Thank you WikiLeaks!! Slowed all our machines!!!
Burn in hell!!!
Can you even read the piece you just quoted? You sure as hell don't understand what it says.
I respect WIKI LEAKS as they released the video "Collateral Murder", and the day to day logs of the second gulf war, you could basically see how many people were killed per day and if they were friendly or enemy or civilian. Its a real eye opener for people who never been to a war. To think a Gov. doesn't spy on it's people, is to be pretty doped up.
Also when you first post And then follow up with a quote... how are you not being serious?
Really man, if this is your style, we have 4chan for that BS. Don't spread it here.
Now you're even deleting your post. ???