Spectre : Différence entre versions

De Vulgum Techus
Aller à : Navigation, rechercher
(ARM)
 
(Une révision intermédiaire par un utilisateur est masquée)
Ligne 1 : Ligne 1 :
 
<!-- Links checked 23/03/19 -->
 
<!-- Links checked 23/03/19 -->
 +
[[Catégorie:AMD]]
 
[[Catégorie:Matériel]]
 
[[Catégorie:Matériel]]
 
[[Catégorie:Sécurité]]
 
[[Catégorie:Sécurité]]
Ligne 22 : Ligne 23 :
 
== [[AMD]] ==
 
== [[AMD]] ==
 
* [https://www.techarp.com/guides/amd-spectre-mitigation-guide/ Tech ARP - 01/02/18] The Complete AMD Spectre Mitigation Strategy Guide
 
* [https://www.techarp.com/guides/amd-spectre-mitigation-guide/ Tech ARP - 01/02/18] The Complete AMD Spectre Mitigation Strategy Guide
* [http://www.amd.com/en/corporate/speculative-execution amd.com] Page '''[[AMD]]''' relative au bug Spectre et Meldown
+
* [http://www.amd.com/en/corporate/speculative-execution amd.com] Page AMD relative au bug Spectre et Meldown
* [https://support.microsoft.com/en-us/help/4073707/windows-operating-system-security-update-for-amd-based-devices support.microsoft.com] Liste des updates '''[[Microsoft]]''' pour les '''[[CPU]] [[AMD]]''' sous '''[[Windows]]'''
+
* [https://support.microsoft.com/en-us/help/4073707/windows-operating-system-security-update-for-amd-based-devices support.microsoft.com] Liste des updates '''[[Microsoft]]''' pour les CPU AMD sous Windows
  
 
== [[Intel]] ==
 
== [[Intel]] ==
* [https://newsroom.intel.com/press-kits/security-exploits-intel-products/?_ga=2.57292264.337385016.1516448441-1169449914.1516448441 newsroom.intel.com] Page '''[[Intel]]''' sur les failles Spectre et Meldown pour ses '''[[processeurs]]'''
+
* [https://newsroom.intel.com/press-kits/security-exploits-intel-products/?_ga=2.57292264.337385016.1516448441-1169449914.1516448441 newsroom.intel.com] Page Intel sur les failles Spectre et Meldown pour ses '''[[processeurs]]'''
 
* [https://security-center.intel.com/advisories.aspx security-center.intel.com] Security Advisories
 
* [https://security-center.intel.com/advisories.aspx security-center.intel.com] Security Advisories
  
Ligne 32 : Ligne 33 :
 
* [https://nvidia.custhelp.com/app/answers/detail/a_id/4611 nvidia.custhelp.com] Security Bulletin: NVIDIA Driver Security Updates for CPU Speculative Side Channel Vulnerabilities
 
* [https://nvidia.custhelp.com/app/answers/detail/a_id/4611 nvidia.custhelp.com] Security Bulletin: NVIDIA Driver Security Updates for CPU Speculative Side Channel Vulnerabilities
  
= [[ARM]] =
+
== [[ARM]] ==
 
* [https://developer.arm.com/support/security-update developer.arm.com] Vulnerability of Speculative Processors to Cache Timing Side-Channel Mechanism
 
* [https://developer.arm.com/support/security-update developer.arm.com] Vulnerability of Speculative Processors to Cache Timing Side-Channel Mechanism
  
Ligne 39 : Ligne 40 :
  
 
= Articles externes =
 
= Articles externes =
* [https://www.hexus.net/tech/news/cpu/117839-amd-ships-patches-address-flaws-unearthed-cts-labs/ Hexus - 03/05/18] '''[[AMD]]''' ships patches to address flaws unearthed by CTS Labs
+
* [https://www.hexus.net/tech/news/cpu/117839-amd-ships-patches-address-flaws-unearthed-cts-labs/ Hexus - 03/05/18] AMD ships patches to address flaws unearthed by CTS Labs
* [https://www.pcworld.com/article/3268469/components-processors/amd-cpu-firmware-windows-10-patches-spectre.html PCWorld - 10/04/18] '''[[AMD]]''' rolls out '''[[CPU]] [[firmware]]''' and '''[[Windows 10]]''' patches to protect against Spectre exploits
+
* [https://www.pcworld.com/article/3268469/components-processors/amd-cpu-firmware-windows-10-patches-spectre.html PCWorld - 10/04/18] AMD rolls out '''[[CPU]] [[firmware]]''' and '''[[Windows 10]]''' patches to protect against Spectre exploits
 
* [https://www.clubic.com/antivirus-securite-informatique/virus-hacker-piratage/piratage-informatique/actualite-842670-spectre-meltdown-piratage-theorique-decouvert.html Clubic - 15/02/18] Spectre et Meltdown : un nouveau piratage théorique découvert
 
* [https://www.clubic.com/antivirus-securite-informatique/virus-hacker-piratage/piratage-informatique/actualite-842670-spectre-meltdown-piratage-theorique-decouvert.html Clubic - 15/02/18] Spectre et Meltdown : un nouveau piratage théorique découvert
 
* [https://www.pcastuces.com/pratique/securite/meltdown_spectre/page1.htm PC Astuces - 14/02/18] Se protéger contre Meltdown et Spectre
 
* [https://www.pcastuces.com/pratique/securite/meltdown_spectre/page1.htm PC Astuces - 14/02/18] Se protéger contre Meltdown et Spectre
* [https://hothardware.com/news/intel-releases-new-spectre-patch-for-skylake-based-processors-sans-nasty-reboot-bug Hot Hardware - 08/02/18] '''[[Intel]]''' Releases New Spectre Patch For Skylake-Based '''[[Processors]]''' Sans Nasty Reboot Bug
+
* [https://hothardware.com/news/intel-releases-new-spectre-patch-for-skylake-based-processors-sans-nasty-reboot-bug Hot Hardware - 08/02/18] Intel Releases New Spectre Patch For Skylake-Based '''[[Processors]]''' Sans Nasty Reboot Bug
 
* [https://www.techrepublic.com/article/spectre-and-meltdown-flaws-being-exploited-by-more-than-100-strains-of-malware/ TechRepublic - 01/02/18] Spectre and Meltdown flaws being exploited by more than 100 strains of malware
 
* [https://www.techrepublic.com/article/spectre-and-meltdown-flaws-being-exploited-by-more-than-100-strains-of-malware/ TechRepublic - 01/02/18] Spectre and Meltdown flaws being exploited by more than 100 strains of malware
  

Version actuelle en date du 19 avril 2019 à 19:19

Lien court vers cette page : https://vt.cx/spectre
QR code vers cette page : https://vt.cx/spectre.qr

Liens utiles

Microsoft

AMD

Intel

nVidia

  • nvidia.custhelp.com Security Bulletin: NVIDIA Driver Security Updates for CPU Speculative Side Channel Vulnerabilities

ARM

  • developer.arm.com Vulnerability of Speculative Processors to Cache Timing Side-Channel Mechanism

Programmes utiles

  • grc.com InSpectre : Utilitaire portable développé par Steve Gibson et détectant failles et ralentissements éventuels dus à des patchs (Windows et Linux avec Wine)

Articles externes

Commentaires

blog comments powered by Disqus