Intel reveals true rate of slowdown caused by Meltdown and Spectre patches

AMD's statement from Senior Vice President and Chief Technology Officer, Mark Papermaster, follows...

"The bottom line is that continued collaboration will create the fastest and most effective approaches to restoring customer confidence in the security of their data".

Unfortunately, any device that uses processors that have the flaw will eventually need to be patched. You get reliable intelligence and forecasts on more than a dozen factors that affect the economy and are critical to your business and financial success.

Finally, software engineer Paul Turner created Retpoline, a software that does the job without slowing down the machines it's applied to.

Spectre breaks the isolation between different applications.

Epic Games, publisher of online video game Fortnite, has been one of the first companies to blame the fix for "login issues" and "service instability".

Spectre and Meltdown account for three variants of the side-channel analysis security issue first identified by the Google Zero Project team and other researchers who found that Intel, AMD, and ARM Holdings processors commonly used in servers and PCs could allow unauthorized users to examine privileged information in memory in certain circumstances. For the latest details, please see Microsoft's website. Linux vendors are also rolling out patches for AMD systems too.

GPZ Variant 2 (Branch Target Injection or Spectre) is applicable to AMD processors.

"We have received reports from a few customers of higher system reboots after applying firmware updates".

Windows 10 downloads the update automatically and will prompt you to install it. To install the update manually, open Settings Update and Security and select "Check for updates" option. The exploit can be blocked by software patches over the short term, but it could slow the affected systems and may ultimately result in the redesign of chip architecture to provide a longer-term fix. As Thomas Lendacky, AMD software engineer and Linux kernel developer, wrote on the Linux Kernel Mailing List (LKML), "AMD processors are not subject to the types of attacks that the kernel page table isolation feature protects against".

CEO Brian Krzanich has promised more transparency from Intel in a seperate post, saying it would publicly disclose significant vulnerabilities and add funding for "academic and independent research into potential security threats", as well as consistent progress reports for all issued and forthcoming patches.

GPZ Variant 3 (Rogue Data Cache Load or Meltdown) is not applicable to AMD processors. We will then focus on issuing updates for older products as prioritized by our customers.

There have also been questions about GPU architectures. The difference is the Spectre and Meltdown flaws are the chip makers' faults, and not the software companies'.

Latest News