Intel promises fix for new 'Variant 4' Meltdown, Spectre vulnerability

in General Discussion
Industry woes over Meltdown and Spectre continued this week when Google and Microsoft on Monday revealed a newly discovered silicon-level vulnerability impacting chips used in millions of computers, including those marketed by Apple.

Dubbed "Variant 4," or Speculative Store Bypass, the latest security flaw is part of the original family of Meltdown and Spectre vulnerabilities made public in January. Intel disclosed the vulnerability in a blog post on Monday.

Similar to Spectre, Variant 4 takes advantage of speculative executions to grant nefarious actors access to sensitive information stored in system memory. The new strain, however, warrants its own designation because it uses a different mechanism to extract said data.

As noted by CNET, Intel categorizes Variant 4 as a moderate risk, saying many of the exploits used to gather sensitive information were fixed in web browser patches pushed out earlier this year to deal with Spectre.

Intel intends to issue a fix for Variant 4 in the coming weeks. Due to the relative low risk of attack in real-world scenarios, the company will ship the patches turned off by default, reports Reuters. Users can enable the fix manually, though running the patch is expected to result in a processor performance slowdown of between 2 percent and 8 percent.

ARM and AMD are also issuing patches for their respective chips, with AMD also advising users leave the fix disabled due to the inherent difficulty of performing a successful attack, the report said.

Whether today's disclosure is related to a set of eight new vulnerabilities uncovered earlier this month is unclear. According to German publication c't, seven of the flaws are similar to Spectre, while an eighth could allow a hacker to launch an exploit in a virtual machine to attack its host system.

Meltdown and Spectre exploit "speculative executive," a modern CPU feature designed to improve operating speed by executing multiple instructions at the same time.

"To increase performance, the CPU predicts which path of a branch is most likely to be taken, and will speculatively continue execution down that path even before the branch is completed," Apple explained in a January statement. "If the prediction was wrong, this speculative execution is rolled back in a way that is intended to be invisible to software."

Though the processes are supposed to be inaccessible by applications and end users, Google researchers discovered that speculative executions could potentially be used to gain access to sensitive information.

Initially thought to be limited to Intel silicon, Meltdown and Spectre were found to affect all modern processors, including ARM-based chips like Apple's A-series SoCs. Shortly after initial reports went live, Apple issued a statement confirming all Mac and iOS CPUs are impacted by the security flaw.


  • Reply 1 of 5
    nunzynunzy Posts: 662member
    Apple really needs to can Intel once and for all. Apple could buy AMD and kill Intel.
  • Reply 2 of 5
    sflocalsflocal Posts: 6,048member
    So is Intel continue to sell/manufacture chips with this flaw unresolved, or are all new chips leaving the fab fixed?
  • Reply 3 of 5
    brian greenbrian green Posts: 662member
    So far, only PowerPC and SPARC chips haven’t been mentioned.  Good times.
    king editor the grate
  • Reply 4 of 5
    IreneWIreneW Posts: 300member
    nunzy said:
    Apple really needs to can Intel once and for all. Apple could buy AMD and kill Intel.
    Well, that wouldn't help in this case, would it?
  • Reply 5 of 5
    nunzynunzy Posts: 662member
    IreneW said:
    nunzy said:
    Apple really needs to can Intel once and for all. Apple could buy AMD and kill Intel.
    Well, that wouldn't help in this case, would it?
    Apple doesn't skate to where the puck is, they skate to where it is going. Always have. Always will.
Sign In or Register to comment.