Puppy Linux Discussion Forum Forum Index Puppy Linux Discussion Forum
Puppy HOME page : puppylinux.com
"THE" alternative forum : puppylinux.info
 
 FAQFAQ   SearchSearch   MemberlistMemberlist   UsergroupsUsergroups   RegisterRegister 
 ProfileProfile   Log in to check your private messagesLog in to check your private messages   Log inLog in 

The time now is Thu 18 Oct 2018, 16:45
All times are UTC - 4
 Forum index » Off-Topic Area » Security
Intel admits 10 chip families can't be Spectre v2 fixed
Post new topic   Reply to topic View previous topic :: View next topic
Page 1 of 1 [3 Posts]  
Author Message
belham2

Joined: 15 Aug 2016
Posts: 1551

PostPosted: Wed 04 Apr 2018, 08:49    Post subject:  Intel admits 10 chip families can't be Spectre v2 fixed  

https://www.theregister.co.uk/2018/04/04/intel_says_some_cpus_with_spectre_v2_cant_be_fixed/

"....Intel has issued fresh "microcode revision guidance" that reveals it won’t address the Meltdown and Spectre design flaws in all of its vulnerable processors – in some cases because it's too tricky to remove the Spectre v2 class of vulnerabilities.

The new guidance, issued April 2, adds a “stopped” status to Intel’s “production status” category in its array of available Meltdown and Spectre security updates. "Stopped" indicates there will be no microcode patch to kill off Meltdown and Spectre.

The guidance explains that a chipset earns “stopped” status because, “after a comprehensive investigation of the microarchitectures and microcode capabilities for these products, Intel has determined to not release microcode updates for these products for one or more reasons.”

Those reasons are given as:........"




...."Stopped" CPUs that won’t therefore get a fix are in the Bloomfield, Bloomfield Xeon, Clarksfield, Gulftown, Harpertown Xeon C0 and E0, Jasper Forest, Penryn/QC, SoFIA 3GR, Wolfdale, Wolfdale Xeon, Yorkfield, and Yorkfield Xeon families. The new list includes various Xeons, Core CPUs, Pentiums, Celerons, and Atoms – just about everything Intel makes.

Most the CPUs listed above are oldies that went OVERPRICED between 2007 and 2011, so it is likely few remain in normal use.

Intel has not revealed which of the "stopped" CPUs listed can’t be mitigated at all, and which Chipzilla can't be bothered finishing patches for. We’ve asked Intel to provide that list, and will update this story if the biz replies........
Back to top
View user's profile Send private message 
8Geee


Joined: 12 May 2008
Posts: 1698
Location: N.E. USA

PostPosted: Thu 19 Apr 2018, 11:48    Post subject:  

Link to the Official Intel list of "stopped" MPU's in pdf. Stopped chips in RED.

Gibson Research Inspectre Download for Windows.

Regards
8Geee

_________________
Linux user #498913

Some people need to reimagine their thinking.
Back to top
View user's profile Send private message 
8Geee


Joined: 12 May 2008
Posts: 1698
Location: N.E. USA

PostPosted: Fri 04 May 2018, 22:40    Post subject:  

New variant of Spectre/Meltdown has arrived. If the Processor splits the L1 cache between instruction and data, these CPU/MPU are now vunerable.

The Atom E600 series from 2010 "Tunnel Creek" and "Stellarton" fit this profile and should be considered vunerable. These two types are System-on-Chip (SoC) embedded MPU's.

The Atom Z2400 series, in colaboration with Android also has this split L1 cache, and is considered vunerable.

Everything else is post-2012, and previously covered.

Regards
8Geee

_________________
Linux user #498913

Some people need to reimagine their thinking.
Back to top
View user's profile Send private message 
Display posts from previous:   Sort by:   
Page 1 of 1 [3 Posts]  
Post new topic   Reply to topic View previous topic :: View next topic
 Forum index » Off-Topic Area » Security
Jump to:  

You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum


Powered by phpBB © 2001, 2005 phpBB Group
[ Time: 0.0311s ][ Queries: 13 (0.0062s) ][ GZIP on ]