When errata attacks
Subject: General Tech | June 28, 2007 - 08:45 AM | Jeremy Hellstrom
Yesterday Intel released a patch to it's C2D processor line, or rather snuck it out. Today on Slashdot is information on what exactly was patched and why you should be worried about it. The issues range from buffer overflow-like vulnerabilities to floating point instruction non-coherencies, and memory corruptions. Even better is the fact that some of these bugs do not seem possible to be fixed via software.
"Recently, Intel patched bugs in its Core 2 processors. Details were scarce; soothing words were spoken to the effect
that a BIOS update is all that is required. OpenBSD founder Theo de Raadt has now provided more details and analysis on
outstanding, fixed, and non-fixable Core 2 bugs. Some choice quotes: 'Some of these bugs... will *ASSUREDLY* be
exploitable from userland code... Some of these are things that cannot be fixed in running code, and some are things
that every operating system will do until about mid-2008."
Here is some more Tech News from around the web:
- Sun debuts two-petaflop "Constellation" supercomputer @ Ars Technica
- Talking with Rhianna Pratchett, writer and co-story designer of Overlord @ Ars Technica
- Pepcom Digital Experience New York June 28th Part 1 @ DragonSteelMods
- Open Source for Everyone Guide @ Digital
- Lara Croft Opens Italy's First Women-Only Beach @ OCModShop
- When Will Google Do Hardware? @ The
- COMPUTEX 2007: Nick's Shuttle Shenanigans @
- COMPUTEX 2007 -
Wrapping It Up! @ Computex
Get notified when we go live!