Intel: CPUs affected by the vulnerabilities will be fully repaired by the end of January

CPU vulnerability

In today’s CES presentation, Intel CEO Brian Krzanich also recently responded to two security loopholes in the world, Meltdown, and Specter, which caused the uproar. He said that affected Intel processor products, this week, the repair update will cover 90% of the last 5 years of products (dating back to 2 or 3 generations of Core); the remaining 10% will be before the end of January repair.

As for the impact on performance, Covey continues to emphasize the high workload. He admitted that, under the certain load, system performance will be observed more significantly weakened, so, Intel is still with industry partners continue to optimize, to minimize the impact.

According to Section’s view, there is no evidence that the two vulnerabilities caused the leakage and theft of real-world user data. However, he still suggests that the best way to stay safe is to immediately apply the vendor-supplied update.

Previously, on earlier CPU models, Smitch, vice president of engineering at Intel’s data center, said it is also working on remediation but could take weeks to deploy.

 

A copy of the list of CPUs that Intel has been affected by the vulnerabilities goes back to the 45nm old Core i7 and the Xeon 3400/5500 series dating back to 2009.

Intel official QA page for this loophole, the giants denied that this is the Intel hardware design flaw, but emphasized that hackers use all the modern processors will be side channel analysis and processing technology, and the implementation of the local code to be run locally, unable to launch a remote attack.