Intel’s Response to Meltdown & Spectre Vulnerabilities

Channel:
Subscribers:
54,600
Published on ● Video Link: https://www.youtube.com/watch?v=8ZzuR0v3UKw



Duration: 8:24
5,988 views
411


Translating Intel’s PR Response to Kernel Memory vulnerabilities now named Meltdown and Spectre.

Meltdown CVE: CVE-2017-5754
Spectre CVE’s: CVE-2017-5753 and CVE-2017-5715

Protection has now been written for Linux Kernel, named KPTI (Kernel Page Table Isolation), which will appear in Kernel 4.14.11 and 4.15.
Patches have been written for Windows 10, and are due to be released in Jan 2018 patch Tuesday.
MacOS has been patched in v10.13.2.

Sources used:
https://newsroom.intel.com/news/intel-responds-to-security-research-findings/
https://meltdownattack.com/
https://lkml.org/lkml/2018/1/3/797
https://insights.ubuntu.com/2018/01/04/ubuntu-updates-for-the-meltdown-spectre-vulnerabilities/
https://www.cnbc.com/2018/01/04/intel-ceo-reportedly-sold-shares-after-the-company-already-knew-about-massive-security-flaws.html
https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)

Like my channel? Please help support it:
Patreon: https://www.patreon.com/quidsup
Paypal: https://www.paypal.me/quidsup

Follow me on Social Media
Google+ https://google.com/+quidsup
Twitter: https://twitter.com/quidsup
Minds: https://minds.com/quidsup







Tags:
Memory
Attack
RAM
Kernel
Linux
MacOS
Windows
Spectre
Meltdown
Intel
ARM
AMD
CVE-2017-5754
CVE-2017-5715
KAISER
KPTI
Server
Cloud
Desktop
Computing
Quidsup