AMD drops after acknowledging vulnerability to Spectre flaw

Ajustar Comentario Impresión

Processor vulnerabilities Spectre and Meltdown have been a nightmare for Intel this month.

Responding to questions about its GPUs, AMD says Radeon architectures do not use speculative execution and therefore are not susceptible to the threats. It's worth noting that a reboot is required to patch the system.

New year, new security vulnerabilities!

Although these recently published attack vectors pose a risk, chip and software vendors and the cybersecurity community understand them well. As Google explained it, there are three variants here.

Intel, the world's biggest chipmaker, has painted the problem as an industry-wide one that affects most modern processors.

GPZ Variant 2, is the second variant of Spectre. Windows 10 is only on a quarter of PCs.

Linux vendors are also rolling out patches across AMD products now. Researchers initially warned that patches could slow the performance of some devices by as much as 30 percent. Finally, apply in production and ensure you have a process to back out the patches if needed.

Is it true the Windows patch for Spectre renders AMD systems unusable? Furthermore, if the said machine is used for any server duties and/or IO-intensive application it will feel even worse.

Intel had first withheld information about the bugs, Melton and Spectre from their customers and they justified themselves saying they had planned to inform the public when all updates were readily available.

What systems require patching for vulnerabilities?

Variant 2 proved to be much more challenging for the Google engineering team.

When news of the flaws broke last week, the industry seemed to be caught off guard, despite the fact that they were going to publicly disclose the flaws on 9 January.

Windows 10 downloads the update automatically and will prompt you to install it. To install the update manually, open Settings Update and Security and select "Check for updates" option. Companies should ensure defense-in-depth info security protections are in place (e.g., endpoint security, firewalls, log management) and are efficiently working.

Meltdown breaks the most fundamental isolation between user applications and the operating system. The exploit can be blocked by software patches over the short term, but it could slow the affected systems and may ultimately result in the redesign of chip architecture to provide a longer-term fix.

Last March, Microsoft committed to using ARM processors for its Azure cloud service, and in December, Microsoft Azure deployed Advanced Micro Devices processors in its data centers.

Comentarios