In today's CES presentation, Intel CEO Brian Krzanich also recently responded to two security loopholes that have caused a stir in the world, Meltdown and Specter.
He said the affected Intel processor products, this week, Repair updates will cover 90% of nearly 5 years of product (up to 2nd or 3rd generation Core); the remaining 10% will be fixed by the end of January.
As for the impact of performance, Section re-odd still stressed that the work load is highly correlated, he said frankly, therefore, under certain load , The system performance will be observed significantly weakened, so Intel will continue with the industry partners continue to optimize, to minimize the impact.
According to Coetzee, there is no evidence that the two vulnerabilities caused any disclosure or theft of data from real-world users, but he still suggested that the best way to stay safe is to use real-time vendor-supplied update operations .
Previously, on earlier CPU models, Smitch, vice president of engineering at Intel's data center, said it is also working on remediation but could take weeks to deploy.
A copy of the list of CPUs that Intel has been affected by the vulnerabilities goes back to the 45nm old Core i7 and the Xeon 3400/5500 series dating back to 2009.
Intel's official QA page for this vulnerability, The giants deny that this is a flaw in Intel hardware design , Emphasizing that hackers have used the side channel analysis and processing techniques of all modern processors and the code execution needs to be run locally and unable to launch remote attacks.