The Project Zero team identified these vulnerabilities in 2017, reporting it to Intel, AMD and ARM on 1 June 2017.Also expanded the list of affected CPUs, and corrected information on the Intel-SA-00086 Detection Tool.Ä«etween -10 : Numerous updates including details of patches and affected CPUs. : Added new sections on the performance impact of the Meltdown and Spectre mitigation patches, and reports of those patches bricking some AMD PCs. Also added details on the Google Retpoline mitigation technique against Spectre attacks. : Updated the article with the AMD confirmation that their processors are vulnerable to both Spectre exploits. Also added cautionary advice on holding off these updates. : Updated the list of vulnerable processors, and added a new section on Intel CPUs spontaneously rebooting after applying Meltdown and Spectre patches. Updated the list of vulnerable processors, mitigation efforts by Microsoft and Apple, as well as the Intel spontaneous reboot issues with their Spectre 2 patches. : Revamped the entire article. Added a new section on the difference between Meltdown and Spectre, and a new section on InSpectre. Updated three sections with new information. : Added a table of CPUs vulnerable to Meltdown and Spectre. Updated four sections with new information. : Updated the table of CPUs vulnerable to Meltdown and Spectre.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |