A critical design flaw in Intel chips that have not been fully disclosed at this time has triggered a massive and coordinated response by both Windows and Linux to implement significant security updates that can potentially lead to performance issues. The flaw is said to allow a cybercriminal attackers to exploit ordinary apps to get access to highly sensitive and protected content of system memory. At this time it is believed that AMD chips are not affected by these vulnerabilities.
Intel issued a statement denying that the exploits were caused by a “bug” or a “flaw.” – “Based on the analysis to date, many types of computing devices – with many different vendors’ processors and operating systems – are susceptible to these exploits,” stated Intel. “Intel believes these exploits do not have the potential to corrupt, modify or delete data.”
Since Intel isn’t able to address the issue, operating system and software makers are forced to handle the issue. Patches to the Linux kernel have been in works for several weeks now. Microsoft and Amazon have maintenance schedules updated for the upcoming weeks.
With the patches, the memory address is still split in two; as patches are expected to prevent attackers from exploiting the Intel chips’ design flaw, but a degradation of chip performance can potentially slow down computers, and cloud services that host sites and services.