Miércoles, 24 Abril, 2019

Patches available for 90 percent of recent chips by next week — Intel

Performance impact of the recent security updates should not be significant and will be mitigated Performance impact of the recent security updates should not be significant and will be mitigated
Eleena Tovar | 14 Enero, 2018, 14:03

While Intel has been plagued with the Meltdown bug, the Spectre flaw is more widespread and could prove to be incredible difficult to fix.

Krzanich sold shares 21 times during 2017, according to filing with the Securities and Exchange Commission.

Since servers also run on affected processors, they could also log into a cloud account and use the Meltdown flaw to bypass security protocols and access multiple users' information simultaneously. As a form of workflow optimization, they also preemptively perform tasks that are not necessarily needed. It was later learned that AMD and ARM hardware are susceptible too, specifically to Spectre. The company further goes on state that "these exploits do not have the potential to corrupt, modify or delete data".

Intel told the Guardian that it "can confirm it is aware of the class actions but as these proceedings are ongoing, it would be inappropriate to comment".

System updates are made available by system manufacturers, operating system providers and others. For its part, Google notes a "negligible impact on performance" for "most of our workloads, including our cloud infrastructure".

While the revealations claimed that the security bug is affecting the devices with processors from AMD as well.

The executives clarified, however, that the performance impact will be negligible when it comes to average PC users. If Intel was hoping to avoid lawsuits, however, it hasn't worked. The flaw leaves your personal devices vulnerable to attack. Unfortunately, this involves reducing the overall performance of the operating system. All three cite the security vulnerability and Intel's delay in public disclosure.

Meanwhile, the company also deployed Kernel Page Table Isolation (KPTI) to counter the third variant known as Meltdown by "better protecting sensitive information in memory from other software running on a machine". For now, the Pixel and Nexus users are only protected.

Developer Alex Ionescu posted on Twitter that Apple included a fix for the flaw in macOS 10.13.2.

Intel expects fixes to start rolling out in the next few days, with further fixes coming over several weeks.

Spectre is less dangerous than Meltdown, but will be more difficult to patch. All of the patches should be out next week. The full public details are scheduled to be released on January 9.

An internal memo, which CNBC received and reported on, suggests Krzanich is bullish on the company's future (stock sale aside).