Spectre : Différence entre versions
De Vulgum Techus
(→Articles externes) |
(→ARM) |
||
(7 révisions intermédiaires par un utilisateur sont masquées) | |||
Ligne 1 : | Ligne 1 : | ||
+ | <!-- Links checked 23/03/19 --> | ||
+ | [[Catégorie:AMD]] | ||
[[Catégorie:Matériel]] | [[Catégorie:Matériel]] | ||
[[Catégorie:Sécurité]] | [[Catégorie:Sécurité]] | ||
− | '''[[Lien court]]''' vers cette page : | + | '''[[Lien court]]''' vers cette page : https://vt.cx/spectre |
− | '''[[QR code]]''' vers cette page : | + | '''[[QR code]]''' vers cette page : https://vt.cx/spectre.qr |
<html> | <html> | ||
− | <script | + | <script async src="//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script> |
− | + | <!-- VT2 --> | |
− | + | <ins class="adsbygoogle" | |
− | + | style="display:inline-block;width:468px;height:60px" | |
− | + | data-ad-client="ca-pub-3341840374417340" | |
− | + | data-ad-slot="6349432125"></ins> | |
− | + | <script> | |
− | </ | + | (adsbygoogle = window.adsbygoogle || []).push({}); |
− | <script | + | |
− | + | ||
</script> | </script> | ||
</html> | </html> | ||
Ligne 23 : | Ligne 23 : | ||
== [[AMD]] == | == [[AMD]] == | ||
* [https://www.techarp.com/guides/amd-spectre-mitigation-guide/ Tech ARP - 01/02/18] The Complete AMD Spectre Mitigation Strategy Guide | * [https://www.techarp.com/guides/amd-spectre-mitigation-guide/ Tech ARP - 01/02/18] The Complete AMD Spectre Mitigation Strategy Guide | ||
− | * [http://www.amd.com/en/corporate/speculative-execution amd.com] Page | + | * [http://www.amd.com/en/corporate/speculative-execution amd.com] Page AMD relative au bug Spectre et Meldown |
− | * [https://support.microsoft.com/en-us/help/4073707/windows-operating-system-security-update-for-amd-based-devices support.microsoft.com] Liste des updates '''[[Microsoft]]''' pour les | + | * [https://support.microsoft.com/en-us/help/4073707/windows-operating-system-security-update-for-amd-based-devices support.microsoft.com] Liste des updates '''[[Microsoft]]''' pour les CPU AMD sous Windows |
== [[Intel]] == | == [[Intel]] == | ||
− | * [https://newsroom.intel.com/press-kits/security-exploits-intel-products/?_ga=2.57292264.337385016.1516448441-1169449914.1516448441 newsroom.intel.com] Page | + | * [https://newsroom.intel.com/press-kits/security-exploits-intel-products/?_ga=2.57292264.337385016.1516448441-1169449914.1516448441 newsroom.intel.com] Page Intel sur les failles Spectre et Meldown pour ses '''[[processeurs]]''' |
* [https://security-center.intel.com/advisories.aspx security-center.intel.com] Security Advisories | * [https://security-center.intel.com/advisories.aspx security-center.intel.com] Security Advisories | ||
Ligne 33 : | Ligne 33 : | ||
* [https://nvidia.custhelp.com/app/answers/detail/a_id/4611 nvidia.custhelp.com] Security Bulletin: NVIDIA Driver Security Updates for CPU Speculative Side Channel Vulnerabilities | * [https://nvidia.custhelp.com/app/answers/detail/a_id/4611 nvidia.custhelp.com] Security Bulletin: NVIDIA Driver Security Updates for CPU Speculative Side Channel Vulnerabilities | ||
− | = [[ARM]] = | + | == [[ARM]] == |
* [https://developer.arm.com/support/security-update developer.arm.com] Vulnerability of Speculative Processors to Cache Timing Side-Channel Mechanism | * [https://developer.arm.com/support/security-update developer.arm.com] Vulnerability of Speculative Processors to Cache Timing Side-Channel Mechanism | ||
Ligne 40 : | Ligne 40 : | ||
= Articles externes = | = Articles externes = | ||
+ | * [https://www.hexus.net/tech/news/cpu/117839-amd-ships-patches-address-flaws-unearthed-cts-labs/ Hexus - 03/05/18] AMD ships patches to address flaws unearthed by CTS Labs | ||
+ | * [https://www.pcworld.com/article/3268469/components-processors/amd-cpu-firmware-windows-10-patches-spectre.html PCWorld - 10/04/18] AMD rolls out '''[[CPU]] [[firmware]]''' and '''[[Windows 10]]''' patches to protect against Spectre exploits | ||
+ | * [https://www.clubic.com/antivirus-securite-informatique/virus-hacker-piratage/piratage-informatique/actualite-842670-spectre-meltdown-piratage-theorique-decouvert.html Clubic - 15/02/18] Spectre et Meltdown : un nouveau piratage théorique découvert | ||
+ | * [https://www.pcastuces.com/pratique/securite/meltdown_spectre/page1.htm PC Astuces - 14/02/18] Se protéger contre Meltdown et Spectre | ||
+ | * [https://hothardware.com/news/intel-releases-new-spectre-patch-for-skylake-based-processors-sans-nasty-reboot-bug Hot Hardware - 08/02/18] Intel Releases New Spectre Patch For Skylake-Based '''[[Processors]]''' Sans Nasty Reboot Bug | ||
* [https://www.techrepublic.com/article/spectre-and-meltdown-flaws-being-exploited-by-more-than-100-strains-of-malware/ TechRepublic - 01/02/18] Spectre and Meltdown flaws being exploited by more than 100 strains of malware | * [https://www.techrepublic.com/article/spectre-and-meltdown-flaws-being-exploited-by-more-than-100-strains-of-malware/ TechRepublic - 01/02/18] Spectre and Meltdown flaws being exploited by more than 100 strains of malware | ||
Version actuelle en date du 19 avril 2019 à 18:19
Lien court vers cette page : https://vt.cx/spectre QR code vers cette page : https://vt.cx/spectre.qr
Sommaire
Liens utiles
Microsoft
- support.microsoft.com Protect your Windows devices against Spectre and Meltdown
AMD
- Tech ARP - 01/02/18 The Complete AMD Spectre Mitigation Strategy Guide
- amd.com Page AMD relative au bug Spectre et Meldown
- support.microsoft.com Liste des updates Microsoft pour les CPU AMD sous Windows
Intel
- newsroom.intel.com Page Intel sur les failles Spectre et Meldown pour ses processeurs
- security-center.intel.com Security Advisories
nVidia
- nvidia.custhelp.com Security Bulletin: NVIDIA Driver Security Updates for CPU Speculative Side Channel Vulnerabilities
ARM
- developer.arm.com Vulnerability of Speculative Processors to Cache Timing Side-Channel Mechanism
Programmes utiles
- grc.com InSpectre : Utilitaire portable développé par Steve Gibson et détectant failles et ralentissements éventuels dus à des patchs (Windows et Linux avec Wine)
Articles externes
- Hexus - 03/05/18 AMD ships patches to address flaws unearthed by CTS Labs
- PCWorld - 10/04/18 AMD rolls out CPU firmware and Windows 10 patches to protect against Spectre exploits
- Clubic - 15/02/18 Spectre et Meltdown : un nouveau piratage théorique découvert
- PC Astuces - 14/02/18 Se protéger contre Meltdown et Spectre
- Hot Hardware - 08/02/18 Intel Releases New Spectre Patch For Skylake-Based Processors Sans Nasty Reboot Bug
- TechRepublic - 01/02/18 Spectre and Meltdown flaws being exploited by more than 100 strains of malware