Google Details Spectre and Meltdown Fixes for Its Cloud Services


IT LOOKS LIKE even Nvidia's graphics cards can't escape the spectre of Spectre, as the graphics processing units (GPUs) in the cards are affected by the flaws.

The Intel exec said users shouldn't feel discouraged by these snags and continue to install updates from OS makers and OEMs.

The good news for us, however, is that a purestrain gaming machine won't see a huge difference in DX11 performance - no matter which of the three generations of processor were used - according to Intel's results. Specifically, these systems are running Intel Broadwell and Haswell CPUs for both client and data center.

The company now says that while it thinks that GPZ Variant 2 is hard to exploit on its chips, it'll still work with its partners to release microcode updates and OS patches to mitigate the vulnerability. Retpoline fully protects against Variant 2 without impacting customer performance on all our platforms.

The notice comes on the heels of a report in The Wall Street Journal that Intel has been quietly advising its customers not to install the latest firmware updates.

The moonshot came from Google engineer Paul Turner, and it's known as "Retpoline". If you have systems that have processors designed in the past five years, then Intel is going to issue a fix if it hasn't already.

Meltdown affects just Intel chips, while Spectre affects just about all modern chips, including AMD, ARM, IBM Power chips and Nvidia. There are important roles for everyone: Timely adoption of software and firmware patches by consumers and system manufacturers is critical.

Recent reports have revealed that in the wake of the panic caused by the reveal of chipset flaws called Meltdown and Spectre, Nvidia has released a software patch for their CPUs.

"While Meltdown and Spectre were disclosed about six months ago, the reboot issues may not have been caught in earlier testing because the environmental variables in the testing environment don't match the environment that the few customers that experienced the issue had", Jett told SearchSecurity.

VMware has pledged to issue fixes at the hypervisor level, and cloud providers such as Google and Amazon say they've patched their VMs, but it's wise to patch the kernels, as well, Pereira said.

"This allows a program to access the memory, and the also the secrets, of other programs and the operating system".