Yes thats the correct link, updated April 9th. And still again has nothing to do with this current exploit. Its all info from 2018 Regarding Spectre and Meltdown
The April 2019 Update was this specifically:
To provide protection against the Spectre Variant 2 (CVE-2017-5175) and Meltdown (CVE-2017-5754) vulnerabilities for systems running VIA processors, Microsoft has released the following security updates: 1. Security update 4493472 (monthly rollup) or 4493448 (security only) for Windows 7, Windows Server 2008 R2, or Windows Server 2008 R2 for x64-based Systems (Server Core installation) - see https://support.microsoft.com/en-us/help/4493472/ or https://support.microsoft.com/en-us/help/4493448/ for more information. 2. Security update 4493446 (monthly rollup) for Windows RT 8.1; Security update 4493446 (monthly rollup) or 4493467 (security only) for Windows 8.1, Windows Server 2012 R2, or Windows Server 2012 R2 (Server Core installation) - see https://support.microsoft.com/en-us/help/4493446/ or https://support.microsoft.com/en-us/help/4493467/ for more information. 3. Cumulative update 4493464 for Windows 10 Version 1803 or Windows Server, version 1803 (Server Core Installation) - see https://support.microsoft.com/en-us/help/4493464/ for more information. Please note that these updates are for VIA processors only. For further Windows Client (IT Pro) guidance, see https://support.microsoft.com/en-us/help/4073119/. For Windows Server guidance, see https://support.microsoft.com/en-us/help/4072698/.
So no, stop with the misinformartion please. This was easy enough to find by just scrolling.
Hey this ain't so bad I'll just drop an 8th or 9th gen chip in my 1151 socket z270. Oh wait Intel decided to require a new motherboard / chipset with the exact same socket for me to do that. I'm sure it was just yet another mistake / oversight on their part that causes me to spend even more money.
Affected Processors
Virtually all of Intel’s chips starting with the Nehalem architecture (launched in 2008, 11 years ago) and newer, with the exception of the Whiskey Lake (ULT refresh), Whiskey Lake (desktop), as well as the Atom and Knights architectures, are affected by the MDS vulnerabilities.
Coffee Lake and Coffee Lake R are NOT in those lines. Whiskey Lake is an 8th & 9th gen CPU same as Coffee Lake and Coffee Lake R. This is where things are confusing as Intel decided to have things based on different cores all in the same generation line.
Was reading it's something new this time, newer than what I read anyway.
Can still check the system on the GRC website though so see if there is a problem.
They seem to have the latest check for it.
But, again, there is NO issue with AMD processors regarding this latest problem. NONE.
This. You're not important enough that someone is going to go through the trouble to exploit these flaws to try to lift your bank account number and password. If they're going to go to all that trouble, they're going to target some corporate VM which might give them access to a bank account with tens of millions of dollars. Not your puny bank account with a few thousand or tens of thousands of dollars.While someone could put malicious code on your computer that would follow through with this vulnerability, an individual is far less likely to be affected than AWS, Azure, etc... For your cloud providers you now have to double your hosts since your vCPUs are cut in half.
not really.To those that think if they get infected they can just wipe and restore from backup I think you're missing the bigger problems. I'm still reading so I will not comment further for now.
I think your misunderstanding the post. 8th and 9th gen CPUs are affected EXCEPT for Whiskey Lake.
I HAD planned to upgrade to a newer intel cpu, but i'll just wait for 2021+ when they finally decide to actually re-make their current architecture
I already conceded to that.
I had old info.
You can always go with AMD for an upgrade.Suddenly I'm glad I haven't yet upgraded from my E6600...
This exploit does not give you unfettered access to info on the computer. It only gives you access to other info which happens to be loaded in that particular core at the moment your exploit code happens to run. So there's a very large element of luck involved. Your malicious code has to just happen to run at the same moment(s) the banking account number and password were in memory. So you need to multiply what you've written by like the 0.000001% probability of your exploit code happening to run at the exact moment someone's banking password passes through the same core's registers (and being able to identify it as a banking password). That low probability means no or very few successes, so anyone going to the trouble of exploiting it will aim for a high-profile target with a big payout should they happen to succeed.Lets say I am a software engineer and I turn evil and decide to write a virus of some sort that stealthily infects 10,000 people. Now I don't know who I am going to infect or if they use online banking. But lets say I get 10% who use online banking. That is a 1000 people now lets say they each have 2 financial accounts each with an avg. of 1000 dollars in it.
I can now harvest banking information for 2000 financial accounts worth an avg total of $2,000,000.00. I can now work on automating the acquisition of this cash and placing it in accounts I control.
See where I am going with this? And infecting 10,000 people is nothing for a virus.
I can tell you from experience that the Epyc are an awesome CPU. The density that they provide over anything that Intel has, well Cascade Lake AP is even more dense but at over 2x the power requirements, is quite nice. We have a couple Dell R7425's and have been happy with them ever since we got them.For most desktop users AMD is the way to go. Ryzen offers more performance than intel at the price points most people are wanting to spend on a pc.
However i still think for laptops, Intel is preferred. AMDs mobile cpus have come a long way and do have some great Igpus, however they have relatively low 1 thread performance. Since Ryzen mobile tops out at 4c 8t, Ryzen Mobile cpus lack the core count advantage that desktop ryzen enjoys, making most Intel laptops better for single or multithreaded applications. Intel makes has 6 and 8 core laptops available.
For servers I would love to learn more. Apparently Cascade lake has hardware mitigation for spectre attacks simmilar to to whisky lake. Epyc is stealing intels sales slowly, but who knows what will happen.
If HT is turned on in the BIOS it should be working. However, according to Intel, just disabling HT won't fix this issue.how can i avoid this updates for my i7 8700 nonk? how do i check if hyperthreading is working properly? thanks in advance
My understanding of how these exploits work is that when you run code in a core, the core speculates what the next instruction will be and tries to pre-process that instruction. e.g. The core has separate hardware for calculating addition vs multiplication. So if you've loaded 2 and 3 into separate registers on the core (a register is just a small cubbyhole of memory used to hold a single piece of data), the core guesses the next instruction will be an addition or multiplication. Instead of waiting to read the next instruction in the code before running the addition or multiplication, it goes ahead and completes both operations while it's reading the next instruction.If HT is turned on in the BIOS it should be working. However, according to Intel, just disabling HT won't fix this issue.