Bekker's Blog

Blog archive

Intel To Patch All Chips Shipped in Last 5 Years by End of January

Intel will release updates for the Meltdown and Spectre vulnerabilities by the end of January for all chips released in the last five years, CEO Brian Krzanich said Monday.

"For our processors and products introduced in the past five years, Intel expects to issue updates for more than 90 percent of them within a week, and the remaining by the end of January," Krzanich said.

His comments came at the start of his keynote Monday night to kick off the CES industry conference in Las Vegas. Facing by far the biggest security crisis since he took over as CEO in May 2013, Krzanich used the first two minutes of the keynote to discuss the security issues before pivoting to a more standard, future-oriented keynote focused on Intel's technologies for artificial intelligence and virtual reality.

Reports emerged last week that Intel and its hardware, operating system and other industry partners were working on patches for a major vulnerability in processors that could allow an attacker to collect sensitive data from computing devices that were working as designed. Intel confirmed and elaborated on the vulnerabilities in a series of public statements last week.

As he thanked industry partners for their speed and effort to release patches, Krzanich showed a slide with statements from those companies about how systems had already been patched. One statement on the slide from Amazon noted, "This is a vulnerability that has existed for more than 20 years in modern processor architectures like Intel, AMD, and ARM across servers, desktops, and mobile devices."

Krzanich's comments Monday did not address whether Intel planned to release updates for products that were more than 5 years old.

His CES comments were also less emphatic than Intel's public statements from last week in downplaying the possibility of performance hits from the patches, although that lack of emphasis could have been simply an effort to get on with the main keynote.

"We believe the performance impact of these updates is highly workload-dependent. Now as a result, we expect some workloads may have a larger impact than others so we'll continue working with the industry to minimize the impact on those workloads over time," Krzanich said Monday.

Previous Intel statements had added that the performance impact for the average computer user "should not be significant," and the company also released partner statements from Apple, Microsoft, Amazon and Google describing the impact with words like "not...meaningful," "not...noticeable," "no measurable reduction" and "negligible impact."

Krzanich encouraged users to apply updates as soon as they become available, and said the exploits don't appear to have been used maliciously yet. "As of now we have not received any information that these exploits have been used to obtain customer data, and we're working tirelessly on these issues to ensure it stays that way," he said.

Posted by Scott Bekker on 01/09/2018 at 8:40 AM


Featured

  • Spaceflight Training in the Middle of a Pandemic

    Surprisingly, the worldwide COVID-19 lockdown has hardly slowed down the space training process for Brien. In fact, it has accelerated it.

  • Surface and ARM: Why Microsoft Shouldn't Follow Apple's Lead and Dump Intel

    Microsoft's current Surface flagship, the Surface Pro X, already runs on ARM. But as the ill-fated Surface RT showed, going all-in on ARM never did Microsoft many favors.

  • IT Security Isn't Supposed To Be Easy

    Joey explains why it's worth it to endure a little inconvenience for the long-term benefits of a password manager and multifactor authentication.

  • Microsoft Makes It Easier To Self-Provision PCs via Windows Autopilot When VPNs Are Used

    Microsoft announced this week that the Windows Autopilot service used with Microsoft Intune now supports enrolling devices, even in cases where virtual private networks (VPNs) might get in the way.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.