Bekker's Blog

Blog archive

Intel To Patch All Chips Shipped in Last 5 Years by End of January

Intel will release updates for the Meltdown and Spectre vulnerabilities by the end of January for all chips released in the last five years, CEO Brian Krzanich said Monday.

"For our processors and products introduced in the past five years, Intel expects to issue updates for more than 90 percent of them within a week, and the remaining by the end of January," Krzanich said.

His comments came at the start of his keynote Monday night to kick off the CES industry conference in Las Vegas. Facing by far the biggest security crisis since he took over as CEO in May 2013, Krzanich used the first two minutes of the keynote to discuss the security issues before pivoting to a more standard, future-oriented keynote focused on Intel's technologies for artificial intelligence and virtual reality.

Reports emerged last week that Intel and its hardware, operating system and other industry partners were working on patches for a major vulnerability in processors that could allow an attacker to collect sensitive data from computing devices that were working as designed. Intel confirmed and elaborated on the vulnerabilities in a series of public statements last week.

As he thanked industry partners for their speed and effort to release patches, Krzanich showed a slide with statements from those companies about how systems had already been patched. One statement on the slide from Amazon noted, "This is a vulnerability that has existed for more than 20 years in modern processor architectures like Intel, AMD, and ARM across servers, desktops, and mobile devices."

Krzanich's comments Monday did not address whether Intel planned to release updates for products that were more than 5 years old.

His CES comments were also less emphatic than Intel's public statements from last week in downplaying the possibility of performance hits from the patches, although that lack of emphasis could have been simply an effort to get on with the main keynote.

"We believe the performance impact of these updates is highly workload-dependent. Now as a result, we expect some workloads may have a larger impact than others so we'll continue working with the industry to minimize the impact on those workloads over time," Krzanich said Monday.

Previous Intel statements had added that the performance impact for the average computer user "should not be significant," and the company also released partner statements from Apple, Microsoft, Amazon and Google describing the impact with words like "not...meaningful," "not...noticeable," "no measurable reduction" and "negligible impact."

Krzanich encouraged users to apply updates as soon as they become available, and said the exploits don't appear to have been used maliciously yet. "As of now we have not received any information that these exploits have been used to obtain customer data, and we're working tirelessly on these issues to ensure it stays that way," he said.

Posted by Scott Bekker on 01/09/2018 at 8:40 AM


Featured

  • Industrial Control System Honeypot Illustrates Bad Security Practices

    Security solutions provider Trend Micro has published results (PDF) from running an industrial control system (ICS) "honeypot."

  • Ransomware: What It Means for Your Database Servers

    Ransomware affects databases in very specific ways. Joey describes the mechanics of a SQL Server ransomware attack, what DBAs can do to protect their systems, and what security measures they should be advocating for.

  • Windows Admin Center vs. Hyper-V Manager: What's Better for Managing VMs?

    Microsoft's preferred interface for Windows Server is Windows Admin Center, but can it really replace Hyper-V Manager for managing virtual machines? Brien compares the two management tools.

  • Microsoft Offers More Help on Windows Server 2008 Upgrades

    Microsoft this week published additional help resources for organizations stuck on Windows Server 2008, which fell out of support on Jan. 14.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.