Spectre : Différence entre versions
De Vulgum Techus
Ligne 1 : | Ligne 1 : | ||
<!-- Links checked 23/03/19 --> | <!-- Links checked 23/03/19 --> | ||
+ | [[Catégorie:AMD]] | ||
[[Catégorie:Matériel]] | [[Catégorie:Matériel]] | ||
[[Catégorie:Sécurité]] | [[Catégorie:Sécurité]] | ||
Ligne 22 : | Ligne 23 : | ||
== [[AMD]] == | == [[AMD]] == | ||
* [https://www.techarp.com/guides/amd-spectre-mitigation-guide/ Tech ARP - 01/02/18] The Complete AMD Spectre Mitigation Strategy Guide | * [https://www.techarp.com/guides/amd-spectre-mitigation-guide/ Tech ARP - 01/02/18] The Complete AMD Spectre Mitigation Strategy Guide | ||
− | * [http://www.amd.com/en/corporate/speculative-execution amd.com] Page | + | * [http://www.amd.com/en/corporate/speculative-execution amd.com] Page AMD relative au bug Spectre et Meldown |
− | * [https://support.microsoft.com/en-us/help/4073707/windows-operating-system-security-update-for-amd-based-devices support.microsoft.com] Liste des updates '''[[Microsoft]]''' pour les | + | * [https://support.microsoft.com/en-us/help/4073707/windows-operating-system-security-update-for-amd-based-devices support.microsoft.com] Liste des updates '''[[Microsoft]]''' pour les CPU AMD sous Windows |
== [[Intel]] == | == [[Intel]] == | ||
− | * [https://newsroom.intel.com/press-kits/security-exploits-intel-products/?_ga=2.57292264.337385016.1516448441-1169449914.1516448441 newsroom.intel.com] Page | + | * [https://newsroom.intel.com/press-kits/security-exploits-intel-products/?_ga=2.57292264.337385016.1516448441-1169449914.1516448441 newsroom.intel.com] Page Intel sur les failles Spectre et Meldown pour ses '''[[processeurs]]''' |
* [https://security-center.intel.com/advisories.aspx security-center.intel.com] Security Advisories | * [https://security-center.intel.com/advisories.aspx security-center.intel.com] Security Advisories | ||
Ligne 39 : | Ligne 40 : | ||
= Articles externes = | = Articles externes = | ||
− | * [https://www.hexus.net/tech/news/cpu/117839-amd-ships-patches-address-flaws-unearthed-cts-labs/ Hexus - 03/05/18] | + | * [https://www.hexus.net/tech/news/cpu/117839-amd-ships-patches-address-flaws-unearthed-cts-labs/ Hexus - 03/05/18] AMD ships patches to address flaws unearthed by CTS Labs |
− | * [https://www.pcworld.com/article/3268469/components-processors/amd-cpu-firmware-windows-10-patches-spectre.html PCWorld - 10/04/18] | + | * [https://www.pcworld.com/article/3268469/components-processors/amd-cpu-firmware-windows-10-patches-spectre.html PCWorld - 10/04/18] AMD rolls out '''[[CPU]] [[firmware]]''' and '''[[Windows 10]]''' patches to protect against Spectre exploits |
* [https://www.clubic.com/antivirus-securite-informatique/virus-hacker-piratage/piratage-informatique/actualite-842670-spectre-meltdown-piratage-theorique-decouvert.html Clubic - 15/02/18] Spectre et Meltdown : un nouveau piratage théorique découvert | * [https://www.clubic.com/antivirus-securite-informatique/virus-hacker-piratage/piratage-informatique/actualite-842670-spectre-meltdown-piratage-theorique-decouvert.html Clubic - 15/02/18] Spectre et Meltdown : un nouveau piratage théorique découvert | ||
* [https://www.pcastuces.com/pratique/securite/meltdown_spectre/page1.htm PC Astuces - 14/02/18] Se protéger contre Meltdown et Spectre | * [https://www.pcastuces.com/pratique/securite/meltdown_spectre/page1.htm PC Astuces - 14/02/18] Se protéger contre Meltdown et Spectre | ||
− | * [https://hothardware.com/news/intel-releases-new-spectre-patch-for-skylake-based-processors-sans-nasty-reboot-bug Hot Hardware - 08/02/18] | + | * [https://hothardware.com/news/intel-releases-new-spectre-patch-for-skylake-based-processors-sans-nasty-reboot-bug Hot Hardware - 08/02/18] Intel Releases New Spectre Patch For Skylake-Based '''[[Processors]]''' Sans Nasty Reboot Bug |
* [https://www.techrepublic.com/article/spectre-and-meltdown-flaws-being-exploited-by-more-than-100-strains-of-malware/ TechRepublic - 01/02/18] Spectre and Meltdown flaws being exploited by more than 100 strains of malware | * [https://www.techrepublic.com/article/spectre-and-meltdown-flaws-being-exploited-by-more-than-100-strains-of-malware/ TechRepublic - 01/02/18] Spectre and Meltdown flaws being exploited by more than 100 strains of malware | ||
Version du 19 avril 2019 à 18:19
Lien court vers cette page : https://vt.cx/spectre QR code vers cette page : https://vt.cx/spectre.qr
Sommaire
Liens utiles
Microsoft
- support.microsoft.com Protect your Windows devices against Spectre and Meltdown
AMD
- Tech ARP - 01/02/18 The Complete AMD Spectre Mitigation Strategy Guide
- amd.com Page AMD relative au bug Spectre et Meldown
- support.microsoft.com Liste des updates Microsoft pour les CPU AMD sous Windows
Intel
- newsroom.intel.com Page Intel sur les failles Spectre et Meldown pour ses processeurs
- security-center.intel.com Security Advisories
nVidia
- nvidia.custhelp.com Security Bulletin: NVIDIA Driver Security Updates for CPU Speculative Side Channel Vulnerabilities
ARM
- developer.arm.com Vulnerability of Speculative Processors to Cache Timing Side-Channel Mechanism
Programmes utiles
- grc.com InSpectre : Utilitaire portable développé par Steve Gibson et détectant failles et ralentissements éventuels dus à des patchs (Windows et Linux avec Wine)
Articles externes
- Hexus - 03/05/18 AMD ships patches to address flaws unearthed by CTS Labs
- PCWorld - 10/04/18 AMD rolls out CPU firmware and Windows 10 patches to protect against Spectre exploits
- Clubic - 15/02/18 Spectre et Meltdown : un nouveau piratage théorique découvert
- PC Astuces - 14/02/18 Se protéger contre Meltdown et Spectre
- Hot Hardware - 08/02/18 Intel Releases New Spectre Patch For Skylake-Based Processors Sans Nasty Reboot Bug
- TechRepublic - 01/02/18 Spectre and Meltdown flaws being exploited by more than 100 strains of malware