AMD admits it is vulnerable to both versions of Spectre

Intel Core i5 Prozessor

AMD admits it is vulnerable to both versions of Spectre

McAfee has rolled out an update to its endpoint security applications.

The real change in AMD's position is with GPZ Variant 2 (Branch Target Injection or Spectre). The Spectre vulnerability is possible on a broad range of processor designs from multiple vendors.

Who is impacted by Meltdown & Spectre? Linux vendors are also rolling out patches for AMD systems too. As a part of that vigilance, I wanted to update the community on our actions to address the situation. Intel shares have lost 4.5 percent since the news of the chip flaws emerged on Jan. 3.

It's been a long week since we first learned about the now infamous Spectre and Meltdown chip vulnerabilities. The Patch Tuesday rollout includes fixes for Windows, Office and Edge. We are patching the CPU vulnerabilities in the same way Amazon will, Epic, and Microsoft, because we have software, too.

The bottom line is that continued collaboration will create the fastest and most effective approaches to restoring customer confidence in the security of their data. Cavium and ARM rival Qualcomm work together to reduce the amount of software that has to be rewritten for ARM chips.

How can we patch vulnerabilities on AMD?

In a statement on the company's website, GM of Intel's data centre group Navin Shenoy said that this problem was specific to the Broadwell and Haswell CPUs used in client and data centres.

More news: Tua Tagovailoa: Catholic-School Grad and Bama Freshman QB Wins It All

In the statement, Krzanich revealed that "some workloads may experience a larger impact than others". We will then focus on issuing updates for older products as prioritised by our customers. This attack allows a program to access the memory, and thus also the secrets, of other programs and the operating system.

What systems require patching for vulnerabilities?

When news of the flaws broke last week, the industry seemed to be caught off guard, despite the fact that they were going to publicly disclose the flaws on 9 January. Devices that are affected by the flaws span laptops, desktops, mobile devices, cloud-based systems, and more.

Of course, there was only one little problem with this fix: The first Microsoft Windows 10 patch bricked some PCs running older AMD processors.

Where to go from here? In a blog post today, Google claimed their solutions resulted in no performance degradation across the different mitigation techniques they have developed.

How have chipmakers and technology companies responded?

Meltdown breaks the most fundamental isolation between user applications and the operating system.

Últimas noticias