Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
Intel Releases Updated Spectre Fixes For Broadwell and Haswell Chips
#1
https://threatpost.com/intel-releases-up...ps/130144/        Intel Releases Updated Spectre Fixes For Broadwell and Haswell Chips   by Lindsey O'Donnell February 28, 2018 , 9:59 am
Intel has issued updated microcode to help safeguard its Broadwell and Haswell chips from the Spectre Variant 2 security exploits.

According to Intel documents, an array of its older processors, including the Broadwell Xeon E3, Broadwell U/Y, Haswell H,S and Haswell Xeon E3 platforms, have now been fixed and are available to hardware partners.
The Spectre and Meltdown defects, which account for three variants of a side-channel analysis security issue in server and desktop processors, could potentially allow hackers to access users’ protected data. Meltdown breaks down the mechanism keeping applications from accessing arbitrary system memory, while Spectre tricks other applications into accessing arbitrary locations in their memory.

The security flaws were first disclosed by Google Project Zero in early January and impact an array of processors on the market, including those from Intel, ARM and AMD. Intel, for its part, initially released patches addressing the Spectre and Meltdown vulnerabilities in January, but later recalled its patches for the Variant 2 flaw – both on the client compute and data center sides – after acknowledging that they caused “higher than expected reboots and other unpredictable system behavior.”

At the time, EVP and general manager of Intel’s data center group Navin Shenoy said that early releases of the firmware were causing an uptick in reboots on updated systems with Broadwell and Haswell chips, and that the chip company was working on new fixes.

“As part of this, we have determined that similar behavior occurs on other products in some configurations, including Ivy Bridge-, Sandy Bridge-, Skylake-, and Kaby Lake-based platforms,” said Shenoy in the post. “We have reproduced these issues internally and are making progress toward identifying the root cause. In parallel, we will be providing beta microcode to vendors for validation by next week.”

According to Intel’s documentation, the Spectre fixes for Sandy Bridge and Ivy Bridge are still in beta and are being tested by hardware partners.
Reply
#2
Apparently this exploit has been around for a while and nothing was done about it because no one knew about it except Intel.I guess it has to be patched once it was bought out into the open Sick
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Google Uncovers 18 Severe Security Vulnerabilities in Samsung Exynos Chips mrtrout 0 557 03-19-2023 , 06:31 PM
Last Post: mrtrout
  Google releases Chrome 90 with HTTPS by default and security fixes Imran 0 1,169 04-15-2021 , 03:00 PM
Last Post: Imran
  Mac Malware 'XCSSET' Adapted for Devices With M1 Chips Bjyda 0 1,570 03-13-2021 , 12:17 AM
Last Post: Bjyda
  Third-Party Investigation Finds No Malicious Chips on Supermicro Motherboards mrtrout 0 1,602 12-12-2018 , 12:51 AM
Last Post: mrtrout
  Chinese spy chips are found in hardware used by Apple, Amazon, Bloomberg says mrtrout 0 1,589 10-04-2018 , 05:04 PM
Last Post: mrtrout



Users browsing this thread: 1 Guest(s)