Categories: Business & Tech News

SOLVED: VIDEO: Quick Explanation of the Massive Intel CPU Flaw Affecting OSx Windows & Linux

UPDATE Saturday Jan 6 – 2018: There are now two known flaws named “Meltdown” and “Spectre”.  Spectre still has not been detailed but applies to virtually all CPU’s including x86 and ARM.

It is now known that Intel (and possibly other CPU manufacturers) have a very serious design flaw with nearly all their CPU’s. Most of the explanations thus far are far too detailed and confusing for even tech’s to understand.  We have laid out what you need to know in two sentences per category.

THE PROBLEM:

The crux of the issue is that the CPU keeps a table of memory locations and it is possible for malicious code to poke at that table and find out what other software has in memory.  This could be things like your password or financial data.

THE FIX:

The solution is to separate the operating system Kernel (Windows, OSX, Linux…) memory map from the memory map for programs.  This is likely to result in a notable decrease in performance.

WHAT, ME WORRY?

Even though this issue (I would not call it a bug) occurs on with all operating systems, developers like Microsoft and Apple were quietly made aware of the problem (likely in early summer of 2017) and have been working on a fix.  Those fixes should be released shortly.

OFFICIAL ANNOUNCEMENTS:

Strangely Intel, Microsoft and Apple have not yet made an official announcements.  AMD has said they are not seeing the problem.

THE VIDEO:

This video does an excellent job of explaining the Intel CPU design flaw in more detail without requiring a PHD to understand this very complex engineering problem.

If you want more detail, there are several sites including the venerable ARSTechnica that provide a full write up on what this flaw is about and how it is being addressed.

.

View Comments

  • There is also a program that Intel has released which scans your PC and tells you if it's susceptible to this flaw. Apparently, my Core i5 has it.

Published by
Ian Matthews

This website uses cookies.