Intel reported that there are information security vulnerabilities in the processor, including Specter and Meltdown told a number of customers, but the notification list does not include the U.S. government.Into the notice of Intel also includes some Chinese technology companies, but there is no evidence, These vulnerabilities were abused, and Intel spokesman responded that the company was unable to notify all parties as planned due to early disclosure of the news.
The problem now is that before the vulnerability was announced, Intel did not prepare for a certain amount of advance in the U.S. government.
An Intel spokesman said: "The Google Project Zeor team and affected vendors, including Intel, follow a code of conduct that is responsible for, and in concert with, best practices." The first disclosures, standards, and practices that have been established are in collaboration with industry participants, media announcements Before the solution was developed and deployed, however, vulnerability information was exposed earlier than industry organizations plan to publicly disclose, and Intel originally planned to engage the U.S. government and other agencies at this point in time.
Intel eventually had to deal with the news at the latest, and Intel planned to notify major customers and other interested parties to develop patches as soon as possible, as planned, before the public disclosure of vulnerabilities. Meltdown and Specter vulnerabilities are particularly dangerous because they theoretically affect all Computer users, and the end result is to launch a large-scale clean-up of all companies to ensure that everyone installs the patch.