AMD Security Statement from CTO and SVP Mark Papermaster

AMD Security Statement from CTO and SVP Mark Papermaster”

In other developments, Microsoft also warned that some computers powered by older processors probably won't work as well as they once did after the antidotes to Spectre and Meltdown are installed.

However, AMD added that it believed that "AMD's processor architectures make it difficult to exploit Variant 2".

On Tuesday, Microsoft published a blog post where it said it expects "most users" with older computers to "notice a decrease in system performance" after applying patches to fix the flaw. "To prevent AMD customers from getting into an unbootable state, Microsoft will temporarily pause sending the following Windows operating system updates to devices with impacted AMD processors at this time,". The performance loss would be up to 10% level.

Intel has admitted that a recent patch rolled out to address massive CPU security flaws is causing reboot problems for some of its customers.

While the Meltdown exploit largely affects Intel chips, it also impacts some ARM-based products used in smart and embedded devices.

It's also worth noting these benchmarks are carried out on NVMe SSDs - Intel 600p SSDs specifically - which, due to their speed, exacerbate the patch slowdown.

Navin Shenoy, general manager of Intel's data centre group said the company had received information about the issue from customers and was discussing the problem directly with data centre customers. However it is supplying driver updates to "mitigate the CPU security issue". For the latest details, please see Microsoft's website.

The company said it will release further updates on its progress "as needed".

Meltdowns, suspect share dealing and class-action suits, it's been an interesting 2018 for Intel so far, and it doesn't seem to be getting better quickly.

Although these newly reported attack vectors are of concern, in practice they will be very challenging for attackers to use as a successful attack vector because of the inherent complexity of memory management in system processors.

The statement continued: "AMD will make optional microcode updates available to our customers and partners for Ryzen and EPYC processors starting this week". Microsoft cautioned the performance of Windows Server systems could suffer a more significant impact, "especially in any IO-intensive application".

Spectre is a name covering two different exploitation techniques known as CVE-2017-5753 or "bounds check bypass", and CVE-2017-5715 or "branch target injection".

Intel CEO Brian Krzanich has written an open letter to the technology community addressing the fallout from the Meltdown and Spectre vulnerability revelations.

Сomo este

Más reciente