Intel's rival also hit with class action lawsuits over CPU security flaw

Intel CEO Brian Krzanich

Reuters Albert Gea

Intel now says that 90 percent of its chips that were affected by these exploits have received patches.

This malware, known as Smoke Loader, looks to be an official patch but will actually let malware loose on your computer, posing potentially a greater threat than the original Meltdown and Spectre vulnerabilities. The company promises to continue pushing out beta microcode updates to its customers as it works toward finding and resolving the core issue. Thankfully, Intel VP Navin Shenoy said that they're close to identifying the problem's root issue. We don't know when an official patch for the problem will be launched, but Intel says it will be delivering microcode to its vendor partners for validation next week.

Intel promised to be transparent about its progress to address the Meltdown and Spectre CPU flaws, but it has been quite a bumpy road so far.

More news: Will Ferrell crashes Australian Open as Ron Burgundy

"ARM Holdings PLC, the company that licenses the ARM architecture to Apple, admits that it was notified of the Security Vulnerabilities in June 2017 by Google's Project Zero and that it immediately notified its architecture licensees (presumably, including Apple) who create their own processor designs of the Security Vulnerabilities", says the lawsuit issued by Anthony Bartling and Jacqueline Olson in a USA district court in San Jose. The company added the patches caused a 2 percent slowdown for usual tasks such as running website servers.

For those customers looking for additional guidance, we have provided more information on this Security Center site.

Advanced Micro Devices (AMD) is not as insulated from the recent central processing unit (CPU) security flaw debacle, as the CPU manufacturer is now facing two class action lawsuits like its competitor Intel. A data center benchmark test simulating a stock exchange showed a 4 percent impact, while tests using the Storage Performance Development Kit (SPDK), which "provide a set of tools and libraries for writing high performance, scalable, user-mode storage applications", showed workload speeds reduced by up to 25 percent. When we conducted testing to stress the CPU (100% write case), we saw an 18% decrease in throughput performance because there was not CPU utilization headroom. More details on some of these options can be found in our white paper and in Google's post on their "Retpoline" security solution.

Latest News