Jump to content


Photo

Intel processor design flaw


  • Please log in to reply
No replies to this topic

#1 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • SWI Friend
  • PipPipPipPipPip
  • 11,079 posts

Posted 03 January 2018 - 08:50 AM

FYI...

Intel processor design flaw
> https://www.theregis...pu_design_flaw/
2 Jan 2018 - "A fundamental design flaw in Intel's processor chips has forced a significant redesign of the Linux and Windows -kernels- to defang the chip-level security bug. Programmers are scrambling to overhaul the open-source Linux kernel's virtual memory system. Meanwhile, Microsoft is expected to publicly introduce the necessary changes to its Windows operating system in an upcoming Patch Tuesday: these changes were seeded to beta testers running fast-ring Windows Insider builds in November and December.
Crucially, these updates to both Linux and Windows will incur a performance hit on Intel products. The effects are still being benchmarked, however we're looking at a ballpark figure of five to 30 per cent slow down, depending on the task and the processor model... The downside to this separation is that it is relatively expensive, time wise, to keep switching between two separate address spaces for every system call and for every interrupt from the hardware. These context switches do not happen instantly, and they force the processor to dump cached data and reload information from memory. This increases the kernel's overhead, and slows down the computer. Your Intel-powered machine will run slower as a result... Microsoft's Azure cloud – which runs a lot of Linux as well as Windows – will undergo maintenance and reboots on January 10, presumably to roll out the above fixes... A spokesperson for Intel was not available for comment."
___

Intel CEO: We're working to patch security issue
> https://www.cnbc.com...urity-flaw.html
Jan 3, 2018 - Intel CEO Brian Krzanich
Video 3:16
> https://www.cnbc.com...es/?symbol=INTC
___

ADV180002 | Guidance to mitigate speculative execution side-channel vulnerabilities
Security Advisory
> https://portal.msrc....isory/ADV180002
Published: 01/03/2018
Executive Summary: Microsoft is aware of a new publicly disclosed class of vulnerabilities referred to as “speculative execution side-channel attacks” that affect many modern processors and operating systems including Intel, AMD, and ARM. Note: this issue will affect other systems such as Android, Chrome, iOS, MacOS, so we advise customers to seek out guidance from those vendors.
Microsoft has released several updates to help mitigate these vulnerabilities. We have also taken action to secure our cloud services. See below for more details..."

- https://www.us-cert....Vulnerabilities
Jan 03, 2018

- https://www.catalog....ity update 2018
1/4/2018

Windows Client Guidance for IT Pros to protect against speculative execution side-channel vulnerabilities
- https://support.micr...speculative-exe
Last Updated: Jan 3, 2018

Windows Server Guidance to protect against the speculative execution side-channel vulnerabilities
- https://support.micr...ive-execution-s
Last Updated: Jan 4, 2018

- https://portal.msrc....57-000d3a33cf99
Jan 03, 2018 - "The January security release consists of security updates for the following software:
    Internet Explorer
    Microsoft Edge
    Microsoft Windows ..."

- https://www.catalog....ity update 2018
1/4/2018
- https://www.catalog.....aspx?q=4056568
1/4/2018

Windows, Meltdown and Spectre: Keep calm and carry on
... There’s no need to panic over the lavishly publicized Meltdown and Spectre security holes. Behind the bellicose roars of certain doom, a handful of important facts stand out
- https://www.computer...d-carry-on.html
Jan 04, 2018
 

:ninja: :ninja:


Edited by AplusWebMaster, 04 January 2018 - 01:51 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.





Member of

Support SpywareInfo Forum - click the button
PayPal - The safer, easier way to pay online!