Intel details rollout of Meltdown and Spectre security updates
- Autor: Monte Muniz Ene 13, 2018,
Ene 13, 2018, 3:39
They are from Google's Project Zero, the University of Pennsylvania, Austria's Graz University of Technology, Australia's University of Adelaide and security firms Cyberus Technology, Rambus and Data61. At the time of writing, it is not thought to affect competing processors from AMD and ARM.
Intel issued a press statement on Wednesday revealing that the security flaw is not only affecting the Intel CPUs. Through the exploit, attackers may gain access to data, though they do not have the power to modify or delete them, Intel added.
According to a Securities and Exchange Commission filing in late November, Krzanich acquired and sold 644,135 shares at a weighted average price of $44.05 by exercising his options. It has mitigated Meltdown with iOS 11.2, macOS 10.13.2, and tvOS 11.2 updates, and plans to release mitigations in Safari to defend against Spectre.
Speculative Execution is a technique used by most modern CPUs to improve performance.
The two flaws "work on personal computers, mobile devices, and in the cloud", the researchers said.
"This is not a bug or a flaw in Intel products", the company writes.
There's nothing you can do to fix the issues other than disconnecting all your devices from the internet.
It outlined that customers need to patch the operating systems they have been using.
Meanwhile, Microsoft issued an emergency update for Windows to add protection against the processor bug.
Windows 10 users have already received the update KB4056892 earlier this month, while Windows 7 and Windows 8 users will be getting the update next Tuesday. This goes across multiple types of devices, manufacturers and operating systems. Executives routinely sell stock, but this move caused some suspicion at the time for just how much stock Krzanich sold.
Krzanich isn't the only tech exec who has recently come under fire to suspicious stock sales ahead of security issues.
Security researchers revealed the existence of Meltdown and Spectre on Wednesday.
Intel also acknowledged that the patch will slow down its chips in some instances, but the slowdown will be workload-dependent.
Meltdown and Spectre flaws deal with one of the most fundamental principles of computer security which states that while running someone's else's code on an operating system, it must be contained with the help of tight permissions and restrictions. Researchers say one of the bugs, called Meltdown, affects nearly every processor Intel has made since the mid-1990s. The list includes Intel Corei3, Corei5, Corei7 processors (45nm and 32nm), Intel Core M processor family (45nm and 32nm), 2nd Generation, 3rd Generation, 4th Generation, 5th Generation, 6th Generation, 7th Generation and 8th Generation Intel Core processors, and many more.