Spectre : Différence entre versions

De Vulgum Techus
Aller à : Navigation, rechercher
(Articles externes)
(ARM)
 
(2 révisions intermédiaires par un utilisateur sont masquées)
Ligne 1 : Ligne 1 :
 +
<!-- Links checked 23/03/19 -->
 +
[[Catégorie:AMD]]
 
[[Catégorie:Matériel]]
 
[[Catégorie:Matériel]]
 
[[Catégorie:Sécurité]]
 
[[Catégorie:Sécurité]]
  '''[[Lien court]]''' vers cette page : http://vt.cx/spectre
+
  '''[[Lien court]]''' vers cette page : https://vt.cx/spectre
  '''[[QR code]]''' vers cette page : http://vt.cx/spectre.qr
+
  '''[[QR code]]''' vers cette page : https://vt.cx/spectre.qr
 
<html>
 
<html>
<script type="text/javascript"><!--
+
<script async src="//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
google_ad_client = "ca-pub-3341840374417340";
+
<!-- VT2 -->
/* VT2 */
+
<ins class="adsbygoogle"
google_ad_slot = "6349432125";
+
    style="display:inline-block;width:468px;height:60px"
google_ad_width = 468;
+
    data-ad-client="ca-pub-3341840374417340"
google_ad_height = 60;
+
    data-ad-slot="6349432125"></ins>
//-->
+
<script>
</script>
+
(adsbygoogle = window.adsbygoogle || []).push({});
<script type="text/javascript"
+
src="//pagead2.googlesyndication.com/pagead/show_ads.js">
+
 
</script>
 
</script>
 
</html>
 
</html>
Ligne 23 : Ligne 23 :
 
== [[AMD]] ==
 
== [[AMD]] ==
 
* [https://www.techarp.com/guides/amd-spectre-mitigation-guide/ Tech ARP - 01/02/18] The Complete AMD Spectre Mitigation Strategy Guide
 
* [https://www.techarp.com/guides/amd-spectre-mitigation-guide/ Tech ARP - 01/02/18] The Complete AMD Spectre Mitigation Strategy Guide
* [http://www.amd.com/en/corporate/speculative-execution amd.com] Page '''[[AMD]]''' relative au bug Spectre et Meldown
+
* [http://www.amd.com/en/corporate/speculative-execution amd.com] Page AMD relative au bug Spectre et Meldown
* [https://support.microsoft.com/en-us/help/4073707/windows-operating-system-security-update-for-amd-based-devices support.microsoft.com] Liste des updates '''[[Microsoft]]''' pour les '''[[CPU]] [[AMD]]''' sous '''[[Windows]]'''
+
* [https://support.microsoft.com/en-us/help/4073707/windows-operating-system-security-update-for-amd-based-devices support.microsoft.com] Liste des updates '''[[Microsoft]]''' pour les CPU AMD sous Windows
  
 
== [[Intel]] ==
 
== [[Intel]] ==
* [https://newsroom.intel.com/press-kits/security-exploits-intel-products/?_ga=2.57292264.337385016.1516448441-1169449914.1516448441 newsroom.intel.com] Page '''[[Intel]]''' sur les failles Spectre et Meldown pour ses '''[[processeurs]]'''
+
* [https://newsroom.intel.com/press-kits/security-exploits-intel-products/?_ga=2.57292264.337385016.1516448441-1169449914.1516448441 newsroom.intel.com] Page Intel sur les failles Spectre et Meldown pour ses '''[[processeurs]]'''
 
* [https://security-center.intel.com/advisories.aspx security-center.intel.com] Security Advisories
 
* [https://security-center.intel.com/advisories.aspx security-center.intel.com] Security Advisories
  
Ligne 33 : Ligne 33 :
 
* [https://nvidia.custhelp.com/app/answers/detail/a_id/4611 nvidia.custhelp.com] Security Bulletin: NVIDIA Driver Security Updates for CPU Speculative Side Channel Vulnerabilities
 
* [https://nvidia.custhelp.com/app/answers/detail/a_id/4611 nvidia.custhelp.com] Security Bulletin: NVIDIA Driver Security Updates for CPU Speculative Side Channel Vulnerabilities
  
= [[ARM]] =
+
== [[ARM]] ==
 
* [https://developer.arm.com/support/security-update developer.arm.com] Vulnerability of Speculative Processors to Cache Timing Side-Channel Mechanism
 
* [https://developer.arm.com/support/security-update developer.arm.com] Vulnerability of Speculative Processors to Cache Timing Side-Channel Mechanism
  
Ligne 40 : Ligne 40 :
  
 
= Articles externes =
 
= Articles externes =
* [http://www.hexus.net/tech/news/cpu/117839-amd-ships-patches-address-flaws-unearthed-cts-labs/ Hexus - 03/05/18] '''[[AMD]]''' ships patches to address flaws unearthed by CTS Labs
+
* [https://www.hexus.net/tech/news/cpu/117839-amd-ships-patches-address-flaws-unearthed-cts-labs/ Hexus - 03/05/18] AMD ships patches to address flaws unearthed by CTS Labs
* [https://www.pcworld.com/article/3268469/components-processors/amd-cpu-firmware-windows-10-patches-spectre.html PCWorld - 10/04/18] '''[[AMD]]''' rolls out '''[[CPU]] [[firmware]]''' and '''[[Windows 10]]''' patches to protect against Spectre exploits
+
* [https://www.pcworld.com/article/3268469/components-processors/amd-cpu-firmware-windows-10-patches-spectre.html PCWorld - 10/04/18] AMD rolls out '''[[CPU]] [[firmware]]''' and '''[[Windows 10]]''' patches to protect against Spectre exploits
* [http://www.clubic.com/antivirus-securite-informatique/virus-hacker-piratage/piratage-informatique/actualite-842670-spectre-meltdown-piratage-theorique-decouvert.html Clubic - 15/02/18] Spectre et Meltdown : un nouveau piratage théorique découvert
+
* [https://www.clubic.com/antivirus-securite-informatique/virus-hacker-piratage/piratage-informatique/actualite-842670-spectre-meltdown-piratage-theorique-decouvert.html Clubic - 15/02/18] Spectre et Meltdown : un nouveau piratage théorique découvert
 
* [https://www.pcastuces.com/pratique/securite/meltdown_spectre/page1.htm PC Astuces - 14/02/18] Se protéger contre Meltdown et Spectre
 
* [https://www.pcastuces.com/pratique/securite/meltdown_spectre/page1.htm PC Astuces - 14/02/18] Se protéger contre Meltdown et Spectre
* [https://hothardware.com/news/intel-releases-new-spectre-patch-for-skylake-based-processors-sans-nasty-reboot-bug Hot Hardware - 08/02/18] '''[[Intel]]''' Releases New Spectre Patch For Skylake-Based '''[[Processors]]''' Sans Nasty Reboot Bug
+
* [https://hothardware.com/news/intel-releases-new-spectre-patch-for-skylake-based-processors-sans-nasty-reboot-bug Hot Hardware - 08/02/18] Intel Releases New Spectre Patch For Skylake-Based '''[[Processors]]''' Sans Nasty Reboot Bug
 
* [https://www.techrepublic.com/article/spectre-and-meltdown-flaws-being-exploited-by-more-than-100-strains-of-malware/ TechRepublic - 01/02/18] Spectre and Meltdown flaws being exploited by more than 100 strains of malware
 
* [https://www.techrepublic.com/article/spectre-and-meltdown-flaws-being-exploited-by-more-than-100-strains-of-malware/ TechRepublic - 01/02/18] Spectre and Meltdown flaws being exploited by more than 100 strains of malware
  

Version actuelle en date du 19 avril 2019 à 18:19

Lien court vers cette page : https://vt.cx/spectre
QR code vers cette page : https://vt.cx/spectre.qr

Liens utiles

Microsoft

AMD

Intel

nVidia

  • nvidia.custhelp.com Security Bulletin: NVIDIA Driver Security Updates for CPU Speculative Side Channel Vulnerabilities

ARM

  • developer.arm.com Vulnerability of Speculative Processors to Cache Timing Side-Channel Mechanism

Programmes utiles

  • grc.com InSpectre : Utilitaire portable développé par Steve Gibson et détectant failles et ralentissements éventuels dus à des patchs (Windows et Linux avec Wine)

Articles externes

Commentaires

blog comments powered by Disqus