Intel Warns Users Not to Install Its ‘Faulty’ Meltdown and Spectre Patches

Haythem Elmir
0 1
Read Time2 Minute, 0 Second

Don’t install Intel’s patches for Spectre and Meltdown chip vulnerabilities.

Intel on Monday warned that you should stop deploying its current versions of Spectre/Meltdown patches, which Linux creator Linus Torvalds calls ‘complete and utter garbage.’

Spectre and Meltdown are security vulnerabilities disclosed by researchers earlier this month in many processors from Intel, ARM and AMD used in modern PCs, servers and smartphones (among other devices), which could allow attackers to steal your passwords, encryption keys and other private information.

 Since last week, users are reporting that they are facing issues like spontaneous reboots and other ‘unpredictable’ system behaviour on their affected computers after installing Spectre/Meltdown patch released by Intel.
Image result for Intel Warns
Keeping these problems in mind, Intel has advised OEMs, cloud service providers, system manufacturers, software vendors as well as end users to stop deploying the current versions of its patches until the chip giant develops ‘a solution to address it.’

« We have now identified the root cause for Broadwell and Haswell platforms, and made good progress in developing a solution to address it, » Intel said in a press release published on Monday.

« Over the weekend, we began rolling out an early version of the updated solution to industry partners for testing, and we will make a final release available once that testing has been completed. »

Linus Torvalds Calls Intel’s Meltdown/Spectre Patches ‘Garbage’

Meanwhile, in a public email conversation, Linus Torvalds complains that he is not happy with the Intel’s approach of protecting the Linux kernel from Spectre and Meltdown flaws, saying:

« They do literally insane things. They do things that do not make sense… I really don’t want to see these garbage patches just mindlessly sent out. … I think we need something better than this garbage. » Torvalds said.

Intel patches require users to manually opt-in and enable the fix while their computers boot up when the security patches for such a critical flaw should be applied automatically.

It’s because the ‘Indirect Branch Restricted Speculation’ or IBRS—one of three new hardware patches offered as CPU microcode updates by Intel—is so inefficient that it would result in widespread performance hits if rolled out worldwide.

So in other words, to prevent bad performance in benchmark tests, Intel is offering users to choose between performance and security.

New Intel patches will be available soon. Stay tuned.

https://thehackernews.com/2018/01/intel-meltdown-spectre-patch.html
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
100 %

Average Rating

5 Star
0%
4 Star
0%
3 Star
0%
2 Star
0%
1 Star
0%

Laisser un commentaire

Next Post

According to TrendMicro Business Email Compromise (BEC) attacks could reach $ 9 billion in 2018

According to TrendMicro Business Email Compromise (BEC) attacks could reach $ 9 billion in 2018 According to a report published by the security firm TrendMicro, Business Email Compromise (BEC) attacks could reach $ 9 billion in 2018. The report highlights the growth of damage caused by hackers who adopts new […]