Windows 10 News and info | Forum
July 11, 2020, Loading... *
Welcome, Guest. Please login or register.

Login with username, password and session length
News: This is a clean Ad-free Forum and protected by StopForumSpam, Project Honeypot, Botscout and AbuseIPDB | This forum does not use audio ads, popups, or other annoyances. New member registration currently disabled.
  Website   Home   Windows 8 Website GDPR Help Login Register  
By continuing to use the site or forum, you agree to the use of cookies, find out more by reading our GDPR policy.
Pages: [1]
Share this topic on Del.icio.usShare this topic on DiggShare this topic on FacebookShare this topic on GoogleShare this topic on MySpaceShare this topic on RedditShare this topic on StumbleUponShare this topic on TechnoratiShare this topic on TwitterShare this topic on YahooShare this topic on Google buzz
Author Topic: Spectre and Meltdown Hardware Protection Added to Intel's 9th Gen CPUs  (Read 422 times)
Hero Member
Offline Offline

Gender: Male
United States United States

Posts: 31575

I Do Windows

WWW Email
« on: October 09, 2018, 02:59:06 AM »

As part of today's Intel's Fall Desktop Launch event, new 9th generation CPUs were announced that include hardware protection for two of the Spectre and Meltdown vulnerability variants. This information was slipped into the fine print of a slide announcing the release of Intel's new 9th Gen CPUs as can be seen below.

Spectre and Meltdown protections in 9th Gen CPUs. (Click to enlarge)

The fine print listed in the slide above states:

The new desktop processors include protections for the security vulnerabilities commonly referred to as "Spectre", "Meltdown" and "L1TF". These protections include a combination of the hardware design changes we announced earlier this year as well as software and microcode updates.

  * Speculative side channel variant Spectre V2 (Branch Target Injection) = Microcode + Software

  * Speculative side channel variant Meltdown V3 (Rogue Data Cache Load) = Hardware

  * Speculative side channel variant Meltdown V3a (Rogue System Register Read) = Microcode

  * Speculative side channel variant V4 (Speculative Store Bypass) = Microcode + Software

  * Speculative side channel variant L1 Terminal Fault = Hardware

In March 2018, Intel announced that they would be adding hardware protection to forthcoming CPUs that would protect users against some of the variants through partitioning.

"While Variant 1 will continue to be addressed via software mitigations, we are making changes to our hardware design to further address the other two," former Intel CEO Brian Krzanich stated in a press release. "We have redesigned parts of the processor to introduce new levels of protection through partitioning that will protect against both Variants 2 and 3. Think of this partitioning as additional “protective walls” between applications and user privilege levels to create an obstacle for bad actors."

With the release of the 9th gen CPUs, hardware protection for the L1 Terminal Fault and Meltdown V3 vulnerabilities has been added, but the other vulnerabilities still require software and microcode protection.

Previous software and microcode protections would cause a performance hit on older CPUs. With the release of these new CPUs, they are powerful enough that any performance hit caused by these protections should not be noticeable.

It has not been detailed what specific hardware changes were made add protection. BleepingComputer has contacted Intel for more information but had not heard back at the time of this publication.

This is a developing story...


Pages: [1]
Jump to:  

Powered by SMF 1.1.21 | SMF © 2017, Simple Machines

Google visited last this page July 08, 2020, 04:56:44 PM