Google Shares High-Performing Solutions to Spectre and Meltdown

  • Google Shares High-Performing Solutions to Spectre and Meltdown

Google Shares High-Performing Solutions to Spectre and Meltdown

He added, "If this requires a revised firmware update from Intel, we will distribute that update through the normal channels". Intel says that end-users should continue applying updates recommended by their system and operating system providers.

Intel said the older the user's processor is, the bigger the performance hit.

While Shenoy has not clarified what systems are experiencing higher reboot rates, it could only be Linux systems for which Intel started rolling out CPU microcode updates yesterday.

The company now says that while it thinks that GPZ Variant 2 is hard to exploit on its chips, it'll still work with its partners to release microcode updates and OS patches to mitigate the vulnerability. Devices using the 7th Gen Kaby Lake-H mobile processors will be around 7% slower, while the performance impact on systems with the 6th Gen Skylake-S platform is estimated to be around 8%.

The good news for the general public is that this doesn't affect them, at least not directly. It closes today's blog post by stating its belief that Reptoline is currently the best solution for patching against Variant 2, so hopefully now that Google has made it available to its industry partners, we'll see wide-scale roll out. If you have systems that have processors designed in the past five years, then Intel is going to issue a fix if it hasn't already. Google's Project Zero (GPZ) divided Meltdown and Spectre into three different classes of attack, and Papermaster laid out AMD's planned response to each.

The potential review of the Intel Meltdown patch comes soon after CEO BrianKrzanich announced the company's "Security-First Pledge". And worse, you may not get patches at the rate you'd expect if Intel is telling system manufacturers not to issue them right now. The bug is also unique to Intel's patch, and other fixes for the Meltdown and Spectre, including those being pushed by Apple and Microsoft, are safe to apply.

However, those who run container infrastructures estimate a milder impact of this additional work than the undertaking for those who must patch VM-based infrastructures, especially manually, to combat Meltdown and Spectre.