Processors

Microsoft releases patches for intel core mds vulnerabilities

Table of contents:

Anonim

Yesterday we learned of new vulnerabilities in Intel's processors, which the company called MDS. Intel came out to put a cold wipe to performance loss issues hours ago with published benchmarks that showed minimal losses after applying patches and disabling multi-threading.

MDS vulnerabilities affect from Intel Core Ivy Bridge processors onwards

The patches to fix all four vulnerabilities (CVE-2019-11091, CVE-2018-12126, CVE-2018-12127, and CVE-2018-12130) have now been released and are available in Windows 10.

It is important to clarify that this vulnerability is only affecting Intel processors. AMD has released a statement claiming that "Fallout", "RIDL" and "ZombieLoad Attack" is not present in any of its processors.

The list of CPUs that are affected is huge. They can go to Intel's support page to check the list of chips affected by MDS, from the third-generation Ivy Bridge processors to the recent ninth-generation Coffee Lake CPUs. Xeon processors are also affected.

We have noted that another source from Intel confirms the vulnerability of 8th and 9th generation Core and Xeon Cascade Lake chipsets to attacks by 'Microarchitectural Store Buffer Data Sampling' (MSBDS) and 'Microarchitectural Load Port Data Sampling' (MLPDS).

Visit our guide on the best PC processors

Patches for Windows 10 are now available

The patches are available separately for Windows 10 versions 1507 (KB4494454), 1607 (KB4494175), 1703 (KB4494453), 1709 (KB4494452), and 1903 (KB4497165 in Insider for Windows), while for versions 1803 and 1809 they are Available in bulk updates (KB4499167 and KB4494441 respectively).

It will be interesting to see in the next few days what is the real impact of these performance patches on the affected Intel Core processors beyond synthetic tests . How will this affect gaming? We do not know yet, but this does not leave Intel in a very good position for its customers. No one can guarantee at this point that more vulnerabilities will not be discovered in the future.

Benchmark.pl Source

Processors

Editor's choice

Back to top button