![]() Google, Amazon and Microsoft all say they've updated their systems to protect against Spectre and Meltdown. , where many computing processes run side by side in different compartments on the same hardware. The issue is a particular concern for data centers run by companies like where you're moving from one level of protection to another," Smith said. The Intel fix will address those "corner cases. The problems occur only when the chip is switching from one level of privilege to another, for example the change from running a computer user's software like Photoshop to the computer's operating system, which gets deeper access to the processor. Which Chips are Vulnerable The methods used to help processing chips to perform faster are actually the root of the problem with Spectre and Meltdown. "We're not turning off the benefits of speculation." "We're putting those mitigations in our designs," Smith said. Intel is effectively taking the software fixes being released now and building them directly into hardware, he said. Intel also is fixing the problem in future chips, starting with products that will arrive later this year, Smith said. It definitely affects out-of-order x86-64 Intel CPUs since 2011. It affects potentially all out-of-order execution Intel processors since 1995, except Itanium and pre-2013 Atoms. That could mean an attacker could get access to passwords, encryption keys and other extremely sensitive data. It can be exploited by normal programs to read the contents of private kernel memory. If an attacker manages to place malicious software on your device, it could use Meltdown or Spectre to listen in on other software whose data is supposed to be secure from eavesdropping within the system. The vulnerabilities, known as Meltdown and Spectre, can allow passwords and other sensitive data on chips to be read. ![]() , and servers - computing devices using chips designed by Intel, Arm and, to a lesser degree, AMD. The vulnerabilities, announced Wednesday by Google and other researchers, open a new avenue of attack on PCs, ![]() we're seeing now the first iterations of patches." "This is not an issue that is not fixable. "This is very very different from FDIV," Krzanich said, criticizing media coverage of Meltdown and Spectre as overblown. Downfall is similar to recent major CPU vulnerabilities such as Meltdown and Spectre, and as hardware grows more complex, Moghini says that more vulnerabilities like Downfall will be discovered, highlighting the need for chip designers to balance performance demands with security needs. Intel said Thursday that 90 percent of computers released in the last 5 years will have fixes available by the end of next week. Said the new problems are much more easily fixed - and indeed are already well on their way to being fixed, at least in the case of Intel-powered PCs and servers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |