MetallicGR

Exploit σε Intel CPU διορθώνεται με αρνητικές συνέπειες

Recommended Posts

An Update on AMD Processor Security (1/11/2018)

 

https://www.amd.com/en/corporate/speculative-execution

 

Google Project Zero (GPZ) Variant 1 (Bounds Check Bypass or Spectre) is applicable to AMD processors.

  • We believe this threat can be contained with an operating system (OS) patch and we have been working with OS providers to address this issue.  

GPZ Variant 2 (Branch Target Injection or Spectre) is applicable to AMD processors.

  • While we believe that AMD’s processor architectures make it difficult to exploit Variant 2, we continue to work closely with the industry on this threat.  We have defined additional steps through a combination of processor microcode updates and OS patches that we will make available to AMD customers and partners to further mitigate the threat.

GPZ Variant 3 (Rogue Data Cache Load or Meltdown) is not applicable to AMD processors.

  • We believe AMD processors are not susceptible due to our use of privilege level protections within paging architecture and no mitigation is required.

 

  • Like 1
Link to comment
Share on other sites

9. Is my device protected after I’ve applied the Windows security updates Microsoft released on January 3, 2018?

To get all available protections for your device(s) against the three vulnerabilities described in this advisory, you must install the security updates for Windows and apply microcode updates provided by your hardware OEM.

If your OEM does not provide a microcode update, or if you are unable to apply it, the Windows security updates released on January 3, 2018 alone address:

  • CVE-2017-5753 - Bounds check bypass (Variant 1, Spectre)
  • CVE-2017-5754 - Rogue data cache load (Variant 3, Meltdown)

 

To address CVE-2017-5715 - Branch target injection (Variant 2, Spectre), you must apply a microcode update in conjunction with the Windows security update. Any questions regarding microcode updates must be directed to your OEM. Systems without updated microcode remain vulnerable to information disclosure as described in FAQ 9 (8): What is the scope of the vulnerabilities?

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002

Άρα, το microcode update για ασφαλές pc απαιτείται μόνο για το Variant 2, Spectre ?

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now