When errata attacks

Subject: General Tech | June 28, 2007 - 11:45 AM |

Yesterday Intel released a patch to it's C2D processor line, or rather snuck it out.  Today on Slashdot is information on what exactly was patched and why you should be worried about it.  The issues range from buffer overflow-like vulnerabilities to floating point instruction non-coherencies, and memory corruptions.  Even better is the fact that some of these bugs do not seem possible to be fixed via software.

"Recently, Intel patched bugs in its Core 2 processors. Details were scarce; soothing words were spoken to the effect

that a BIOS update is all that is required. OpenBSD founder Theo de Raadt has now provided more details and analysis on

outstanding, fixed, and non-fixable Core 2 bugs. Some choice quotes: 'Some of these bugs... will *ASSUREDLY* be

exploitable from userland code... Some of these are things that cannot be fixed in running code, and some are things

that every operating system will do until about mid-2008."

Here is some more Tech News from around the web:

Tech Talk

Source: Slashdot

No comments posted yet.

Post new comment

The content of this field is kept private and will not be shown publicly.
  • Lines and paragraphs break automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <code> <ul> <ol> <li> <dl> <dt> <dd> <blockquote><p><br>
  • Web page addresses and e-mail addresses turn into links automatically.

More information about formatting options

By submitting this form, you accept the Mollom privacy policy.