Intel released a complete list of vulnerabilities CPU: 1 to 8 generations of Core in the trick

Recently, security researchers reported Meltdown and Specter two loopholes, Intel, ARM, AMD and other CPU products have been affected, once the BUG is used, will result in the disclosure of sensitive data users, with serious consequences.

In the end what exactly are Intel processors affected? Now the official gives a detailed list -

As you can see, all of the Core i3 / 5/7/9 processors from 1 to 8 generations, all Xeon Xeon processors, a large number of Atom processors and the Celeron Pentium are affected. Only IA-64's Itanium , A small amount of Atom, Pentium / Celeron G Department Nothing.

among them, The earliest can be traced back to 2009 45nm old Core i7It seems that the so-called all processors have been affected after 1995, is an exaggeration.

According to Intel's official commitment, By the end of next week, Intel is releasing updates that will cover more than 90% of processor products introduced in the past five years As for earlier, it will take weeks to fully benefit.

According to a well-known domestic soft kill research findings, attackers can exploit the CPU data cache side channel attacks to achieve over-privileged access to high-privilege memory information (such as kernel layout information leakage, cloud server isolation protection bypass, browse Password information leakage, etc.).

Vulnerability is serious and very extensive, taking into account this type of vulnerability belongs to the CPU design logic flaw, it is difficult to repair, the major system vendors in the form of patch upgrade, the main method is KPTI ('kernel page table isolation') separation User space and kernel space page tables, but may result in system performance loss, the current comparative test performance reduction of at least 5%.

2016 GoodChinaBrand | ICP: 12011751 | China Exports