Originally thought to be just a server-level security breach, but further information shows that the Intel processor, the poke stabbed the wave of the past 20 years all use their CPU products, whether you are a cell phone or a computer.
Intel officials responded that they and related technology companies have fully understood the working mechanism of security breach, if malicious use, it may cause information data leakage, but never modify, delete and lead to the possibility of system crash.
The second point, on the loophole is only a design BUG or shortcomings Intel Intel x86-64 processor, Intel think the report is wrong. They pointed out that the AMD / ARM server system has in fact been affected, everyone is working together to develop the most thorough response.
The third point, the so-called patch after the performance loss of 30% to 35%. Intel emphasizes that performance issues are strongly associated with workload and can not be generalized. In fact, for each user, there will be no significant impact, and (even if the performance is weakened) will be reduced over time.
Intel emphasized that they have begun to provide software and firmware updates. Originally and Microsoft, Google and other companies to discuss well, open this loophole next week and at the same time give a solution, the results of the first kick TheReg, at the same time all kinds of so-called "Intel hide conceal, steal repair" performance Big loss "Intel x86 Design BUG 10 years," appeared, so that they had to stand up early to face up to hear.
Finally, Intel said that their products are the safest in the world. At the same time, they hope users can keep up with system-level and chip-level updates in time to ensure that they are always protected.
Last but not the least, the origin of the story Intel's CPU architecture, which has been around for nearly a decade, was found to have a core memory leak that could allow malicious scripts to read core memory directly and take sensitive information away. At the same time, external researchers said, Intel can not be repaired by the BIOS update, Linux kernel or even Windows NT have to fill pit accordingly.
Intel skimmed itself, denied architecture design flaws, performance issues do not recognize so exaggerated, but did not dare to shoot directly. Even more absolutely, Intel pulled AMD / ARM, that you see, the outside world said that only our CPU problems, in fact, the wrong, the two guys also tricked. Now, AMD and ARM have also responded.
According to PCPer reports, AMD conducted an analysis of the three forms of attack on the vulnerabilities and found that due to differences in AMD architecture design and OS-level fixes, their products are now considered near-zero risk.
ARM pointed out thatAxiosReported) that the vulnerability is in the form of a hierarchal access to highly-privileged memory data, and that their User Internet of Things Coachex-M processor is fine, but some Corex-A processors may be vulnerable. But, in particular, ARM points out that we are much safer than Intel.
Google Project Zero security team also came out in the first solidarity Intel, wording basically the same. Google said that Android and other related systems have been fixed, you can resist the risk.