{"id":36069,"date":"2018-01-10T22:09:31","date_gmt":"2018-01-10T21:09:31","guid":{"rendered":"http:\/\/www.planet3dnow.de\/cms\/?p=36069"},"modified":"2018-01-14T08:03:50","modified_gmt":"2018-01-14T07:03:50","slug":"amd-stellt-klar-ms-patch-nur-gegen-spectre-auf-amd-hardware","status":"publish","type":"post","link":"https:\/\/www.planet3dnow.de\/cms\/36069-amd-stellt-klar-ms-patch-nur-gegen-spectre-auf-amd-hardware\/","title":{"rendered":"<span class=\"caps\">AMD<\/span> stellt klar: MS-Patch nur gegen Spectre auf AMD-Hardware"},"content":{"rendered":"<p>Gestern berich\u00adte\u00adten wir \u00fcber eine Rei\u00adhe Patches, die die soge\u00adnann\u00adte Melt\u00addown-L\u00fccke auf AMD-Sys\u00adte\u00admen schlie\u00ad\u00dfen soll\u00adte. Die\u00adse f\u00fchr\u00adte auf man\u00adchen \u00e4lte\u00adren AMD-Com\u00adpu\u00adtern aus der Ath\u00adlon-64-\u00c4ra zu Blue\u00adscreens beim Start. Den Feh\u00adler f\u00fchr\u00adte Micro\u00adsoft auf feh\u00adler\u00adhaft doku\u00admen\u00adtier\u00adte AMD-Chip\u00ads\u00e4t\u00adze zur\u00fcck. Dies sorg\u00adte nat\u00fcr\u00adlich f\u00fcr Ver\u00adwir\u00adrung, hat\u00adte <span class=\"caps\">AMD<\/span> kurz zuvor bekannt gege\u00adben, nicht von Melt\u00addown betrof\u00adfen zu&nbsp;sein.<\/p>\n<p>Ent\u00adge\u00adgen der <a href=\"http:\/\/news.softpedia.com\/news\/microsoft-pulls-kb4056892-kb4056894-updates-due-to-issues-on-amd-systems-519278.shtml\">Stel\u00adlung\u00adnah\u00adme Micro\u00adsofts<\/a> zu den Start\u00adpro\u00adble\u00admen soll es sich laut <span class=\"caps\">AMD<\/span> nicht um einen Patch f\u00fcr Melt\u00addown und Spect\u00adre, son\u00addern nur um einen f\u00fcr Spect\u00adre bzw. Vari\u00adan\u00adte 1 in der Goog\u00adle Pro\u00adject Zero Nomen\u00adkla\u00adtur han\u00addeln. Dem\u00adnach ist der Arti\u00adkel Micro\u00adsofts so feh\u00adler\u00adhaft wie viel\u00adleicht manch eine Chip\u00adsatz\u00addo\u00adku. Den genau\u00aden Feh\u00adler, der zu dem Blue\u00adscreen f\u00fchrt, konn\u00adte man uns indes nicht mit\u00adtei\u00adlen, und so bleibt die\u00adser Punkt im Raum der Spekulation.<\/p>\n<blockquote><p>Micro\u00adsoft has just con\u00adfirm\u00aded issues with a series of <strong>Melt\u00addown and Spect\u00adre<\/strong> secu\u00adri\u00adty updates for Win\u00addows devices run\u00adning on <span class=\"caps\">AMD<\/span> chip\u00adsets, and the com\u00adpa\u00adny tem\u00adpo\u00adr\u00ada\u00adri\u00adly pul\u00adled all the\u00adse patches to pre\u00advent fur\u00adther issues on the impac\u00adted computers.<\/p><\/blockquote>\n<p>Das passt dann auch wie\u00adder zu <a href=\"http:\/\/www.amd.com\/en\/corporate\/speculative-execution\">AMDs Stel\u00adlung\u00adnah\u00adme.<\/a> Die\u00adse ist bez\u00fcg\u00adlich der Vari\u00adan\u00adte 2 Branch Tar\u00adget Injec\u00adtion, wel\u00adche eben\u00adfalls zu Spect\u00adre z\u00e4hlt, noch sehr vage for\u00admu\u00adliert. So hei\u00dft es dort schlicht, dass die Angreif\u00adbar\u00adkeit von AMD-Hard\u00adware nahe\u00adzu null sei, es g\u00e4be ja auch noch kei\u00adne Demons\u00adtra\u00adti\u00adon des Sze\u00adna\u00adri\u00ados auf AMD-Hard\u00adware. Bei Vari\u00adan\u00adte 3, wel\u00adche als Melt\u00addown bekannt ist, spricht <span class=\"caps\">AMD<\/span> hin\u00adge\u00adgen kla\u00adre Wor\u00adte: Kei\u00adne Anf\u00e4l\u00adlig\u00adkeit wegen Architekturunterschieden.<\/p>\n<table class=\"table-condensed table-striped\">\n<thead>\n<tr>\n<td><span style=\"font-size: 10pt;\">&nbsp;<\/span><\/td>\n<td><span style=\"font-size: 10pt;\"><strong>Goog\u00adle Pro\u00adject Zero (<span class=\"caps\">GPZ<\/span>) Rese\u00adarch&nbsp;Title<\/strong><\/span><\/td>\n<td><span style=\"font-size: 10pt;\"><strong>Details<\/strong><\/span><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"text-align: left;\"><span style=\"font-size: 10pt;\">Vari\u00adant&nbsp;One<\/span><\/td>\n<td style=\"text-align: left;\"><span style=\"font-size: 10pt;\">Bounds Check Bypass<\/span><\/td>\n<td style=\"text-align: left;\"><span style=\"font-size: 10pt;\">Resol\u00adved by soft\u00adware \/ <span class=\"caps\">OS<\/span> updates to be made available by sys\u00adtem ven\u00addors and manu\u00adfac\u00adtu\u00adr\u00aders. Negli\u00adgi\u00adble per\u00adfor\u00admance impact expected.<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\"><span style=\"font-size: 10pt;\">Vari\u00adant&nbsp;Two<\/span><\/td>\n<td style=\"text-align: left;\"><span style=\"font-size: 10pt;\">Branch Tar\u00adget Injection<\/span><\/td>\n<td style=\"text-align: left;\"><span style=\"font-size: 10pt;\">Dif\u00adfe\u00adren\u00adces in <span class=\"caps\">AMD<\/span> archi\u00adtec\u00adtu\u00adre mean the\u00adre is a near zero risk of explo\u00adita\u00adti\u00adon of this vari\u00adant. Vul\u00adnerabi\u00adli\u00adty to Vari\u00adant 2 has not been demons\u00adtra\u00adted on <span class=\"caps\">AMD<\/span> pro\u00adces\u00adsors to&nbsp;date.<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\"><span style=\"font-size: 10pt;\">Vari\u00adant&nbsp;Three<\/span><\/td>\n<td style=\"text-align: left;\"><span style=\"font-size: 10pt;\">Rogue Data Cache&nbsp;Load<\/span><\/td>\n<td style=\"text-align: left;\"><span style=\"font-size: 10pt;\">Zero <span class=\"caps\">AMD<\/span> vul\u00adnerabi\u00adli\u00adty due to <span class=\"caps\">AMD<\/span> archi\u00adtec\u00adtu\u00adre differences.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Auch bei der Vari\u00adan\u00adte 1, die von Micro\u00adsoft gepatched wer\u00adden soll, han\u00addelt es sich um eine L\u00fccke, die laut <span class=\"caps\">AMD<\/span> auf fast allen Sys\u00adte\u00admen durch die Vor\u00adein\u00adstel\u00adlung deak\u00adti\u00adviert ist. Der Patch soll zu kei\u00adne sp\u00fcr\u00adba\u00adren Leis\u00adtungs\u00adein\u00adbu\u00ad\u00dfen f\u00fch\u00adren. Unab\u00adh\u00e4n\u00adgi\u00adge Tests auf AMD-Sys\u00adte\u00admen konn\u00adten wir bis\u00adlang dazu nicht fin\u00adden, noch konn\u00adten wir einen ent\u00adspre\u00adchen\u00adden Test durchf\u00fchren.&nbsp;<img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/vg01.met.vgwort.de\/na\/84e4c850f99040bdbe17baf0df68df72\" alt width=\"1\" height=\"1\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gestern berich\u00adte\u00adten wir \u00fcber eine Rei\u00adhe Patches, die die soge\u00adnann\u00adte Melt\u00addown-L\u00fccke auf AMD-Sys\u00adte\u00admen schlie\u00ad\u00dfen soll\u00adte. Die\u00adse f\u00fchr\u00adte auf man\u00adchen \u00e4lte\u00adren AMD-Com\u00adpu\u00adtern aus der Ath\u00adlon-64-\u00c4ra zu Blue\u00adscreens beim Start. Den Feh\u00adler f\u00fchr\u00adte Micro\u00adsoft auf feh\u00adler\u00adhaft doku\u00admen\u00adtier\u00adte AMD-Chip\u00ads\u00e4t\u00adze zur\u00fcck. Dies sorg\u00adte nat\u00fcr\u00adlich f\u00fcr Ver\u00adwir\u00adrung, hat\u00adte <span class=\"caps\">AMD<\/span> kurz zuvor bekannt gege\u00adben, nicht von Melt\u00addown betrof\u00adfen zu sein. (\u2026) <a class=\"moretag\" href=\"https:\/\/www.planet3dnow.de\/cms\/36069-amd-stellt-klar-ms-patch-nur-gegen-spectre-auf-amd-hardware\/\">Wei\u00adter\u00adle\u00adsen&nbsp;\u00bb<\/a><\/p>\n","protected":false},"author":11,"featured_media":35751,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"wp_typography_post_enhancements_disabled":false,"ngg_post_thumbnail":0,"footnotes":""},"categories":[12,11],"tags":[966,1419,968,1420],"class_list":["post-36069","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aktuelles","category-news","tag-amd","tag-meltdown","tag-microsoft","tag-spectre","entry"],"share_on_mastodon":{"url":"","error":""},"_links":{"self":[{"href":"https:\/\/www.planet3dnow.de\/cms\/wp-json\/wp\/v2\/posts\/36069","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.planet3dnow.de\/cms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.planet3dnow.de\/cms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.planet3dnow.de\/cms\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.planet3dnow.de\/cms\/wp-json\/wp\/v2\/comments?post=36069"}],"version-history":[{"count":5,"href":"https:\/\/www.planet3dnow.de\/cms\/wp-json\/wp\/v2\/posts\/36069\/revisions"}],"predecessor-version":[{"id":36079,"href":"https:\/\/www.planet3dnow.de\/cms\/wp-json\/wp\/v2\/posts\/36069\/revisions\/36079"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.planet3dnow.de\/cms\/wp-json\/wp\/v2\/media\/35751"}],"wp:attachment":[{"href":"https:\/\/www.planet3dnow.de\/cms\/wp-json\/wp\/v2\/media?parent=36069"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.planet3dnow.de\/cms\/wp-json\/wp\/v2\/categories?post=36069"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.planet3dnow.de\/cms\/wp-json\/wp\/v2\/tags?post=36069"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}