Nvidia Patches Drivers Against Meltdown And Spectre

Intel has admitted that patches to fix the Spectre and Meltdown chip flaws could slow machines "in some cases".

This slowdown becomes even more worrisome for users running Windows OS on older Intel CPUs-2015-era PCs with Haswell or older CPU, to be precise.

Intel said on Thursday it would issue patches for 90 percent of the chips less than 5 years old by Jan 15 and will then focus on providing patches for the older chips.

At AMD, security is our top priority and we are continually working to ensure the safety of our users as new risks arise. The future security updates will be released to Windows PCs only when a specific registry setting is changed, it revealed.

Krzanich sold $24 million worth of stock back in November 2017, with the sale taking place after Intel found out about the huge Meltdown and Spectre bugs, as they found out months before that. A patch for the first variant of Spectre (CVE-2017-5753) is included in today's update. Nvidia has patched its graphics cards to protect against the devastating Spectre attack that shook up the computing world over the past week. As I noted in my CES comments this week, the degree of collaboration across the industry has been remarkable.

Simon Segars, the chief executive of chip designer ARM Holdings, described speculative execution as the equivalent of spinning a bunch of plates in the air, with the plates holding data.

Windows Server on any silicon, especially in any IO-intensive application, shows a more significant performance impact when you enable the mitigations to isolate untrusted code within a Windows Server instance.

That is to say, users are being advised to consider whether they really need to install the patch, given the performance hit they're likely to suffer.

The real change in AMD's position is with GPZ Variant 2 (Branch Target Injection or Spectre).

Ultimately the results trend close to the 5% mark overall.

Meltdown could provide hackers the ability to become squatters on cloud-based services, but more importantly provide them access to other consumers' information, including passwords.

Intel has pledged to further transparency, whilst altering its guidance on performance issues around security fixes, after recent revelations of two major CPU security flaws. The blog post discussed the trio of vulnerabilities under the Meltdown and Spectre classifications (outlined above).

  • Leon Brazil