Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Intel Security Hardware Technology

Intel Fixes a Security Flaw It Said Was Repaired 6 Months Ago (nytimes.com) 27

An anonymous reader quotes a report from The New York Times: Last May, when Intel released a patch for a group of security vulnerabilities researchers had found in the company's computer processors, Intel implied that all the problems were solved. But that wasn't entirely true, according to Dutch researchers at Vrije Universiteit Amsterdam who discovered the vulnerabilities and first reported them to the tech giant in September 2018. The software patch meant to fix the processor problem addressed only some of the issues the researchers had found. It would be another six months before a second patch, publicly disclosed by the company on Tuesday, would fix all of the vulnerabilities Intel indicated were fixed in May, the researchers said in a recent interview.

The public message from Intel was "everything is fixed," said Cristiano Giuffrida, a professor of computer science at Vrije Universiteit Amsterdam and one of the researchers who reported the vulnerabilities. "And we knew that was not accurate." While many researchers give companies time to fix problems before the researchers disclose them publicly, the tech firms can be slow to patch the flaws and attempt to muzzle researchers who want to inform the public about the security issues. Researchers often agree to disclose vulnerabilities privately to tech companies and stay quiet about them until the company can release a patch. Typically, the researchers and companies coordinate on a public announcement of the fix. But the Dutch researchers say Intel has been abusing the process. Now the Dutch researchers claim Intel is doing the same thing again. They said the new patch issued on Tuesday still doesn't fix another flaw they provided Intel in May. The Intel flaws, like other high-profile vulnerabilities the computer security community has recently discovered in computer chips, allowed an attacker to extract passwords, encryption keys and other sensitive data from processors in desktop computers, laptops and cloud-computing servers.
Intel says the patches "greatly reduce" the risk of attack, but don't completely fix everything the researchers submitted.

The company's spokeswoman Leigh Rosenwald said Intel was publishing a timeline with Tuesday's patch for the sake of transparency. "This is not something that is normal practice of ours, but we realized this is a complicated issue. We definitely want to be transparent about that," she said. "While we may not agree with some of the assertions made by the researchers, those disagreements aside, we value our relationship with them."
This discussion has been archived. No new comments can be posted.

Intel Fixes a Security Flaw It Said Was Repaired 6 Months Ago

Comments Filter:
  • Oh be honest (Score:4, Insightful)

    by oldgraybeard ( 2939809 ) on Tuesday November 12, 2019 @06:51PM (#59408290)
    every developer has had the bug that was fixed! "kinda"

    Just my 2 cents ;)
    • " I think" "Let me check on that"

      My 2 cents ;)
      • I don't think these are vulnerabilities that can be fixed with BIOS and software alone.
        • Yeap, I think the same: smells like a hardware issue
        • I think they could, it would just cripple the processor so much that it would make the computer near-unusable. Not the smaller 10% or 30% performance hits we've seen so far.

          Then again, I'm just basing this off Intel's reaction, not a deep understanding of the architecture itself. Don't assume malice when it could be incompetence.... unless it was malice the last 5 times?

      • This is like Intel's ingenious 320--series self-bricking SSDs from a couple of years ago:

        "We've fixed the bug that causes the drives to brick themselves".

        "OK, now we've really fixed the bug that causes the drives to brick themselves".

        "This time we've really really really fixed the bug that causes the drives to brick themselves, promise and pinky-swear".

        "We've now resolved the problem by withdrawing the 320 from sale and pretending it never existed. 320? What's that? We never sold anything like that, and

    • by Tailhook ( 98486 )

      But it's a bash Intel story! And it's NYT! Omg I'm getting moist!

    • by bblb ( 5508872 )

      Wait, I thought you fixed that?

      What, no... I thought you said you were gonna fix it?

    • by awe_cz ( 818201 )
      True story!
    • Re: Oh be honest (Score:4, Insightful)

      by slick7 ( 1703596 ) on Wednesday November 13, 2019 @02:33AM (#59409230)

      every developer has had the bug that was fixed! "kinda"

      If by "kinda", you mean it wasn't done right the first time; what makes you think any half measure "patches" will correct the issue? My experience has shown me, at least, doing the job right the first time regardless of time constraints, pressure from others or trying to save face is the only way. Even if one needs to start over from scratch. The saying "Pay me now or pay me later" comes to mind. It's just that paying later usually involves interest; time, money or embarrasment.

      • ...My experience has shown me, at least, doing the job right the first time regardless of time constraints, pressure from others or trying to save face is the only way. Even if one needs to start over from scratch. The saying "Pay me now or pay me later" comes to mind. It's just that paying later usually involves interest; time, money or embarrasment.

        Sometimes the price is paid in human lives. I am thinking of Boeing and the 737-MAX.

        • Sometimes the price is paid in human lives. I am thinking of Boeing and the 737-MAX.

          Nothing important would run on an Intel though

      • by dissy ( 172727 )

        If by "kinda", you mean it wasn't done right the first time; what makes you think any half measure "patches" will correct the issue? My experience has shown me, at least, doing the job right the first time regardless of time constraints, pressure from others or trying to save face is the only way.

        I'm not sure about the "only way"

        I wouldn't mind a partial mitigation released ahead of the full fix, so long as it is explicitly described as exactly that, a partial mitigation until the full patch gets released.

        It's the lying and hiding what's happening that makes all of it unacceptable.

        Had instead Intel released a partial fix and stated what it mitigates and what it doesn't, with the remaining "doesn't" to be fixed in the next months patch, I don't think many would think any less of them that they curren

    • by jwhyche ( 6192 )

      Way to go Intel. Let's just keep dropping that ball and kicking that can on down the street.

  • Or is this another step ? The trouble is that they have lied once, so do we trust them this time round ?

  • Computers became fast enough for me around the C2D 2.0Ghz mark. I stopped caring so much who had the fastest and now it's more about who has the most interesting ISA, hardware, or other quirks. So, Intel vs AMD isn't nearly as important as it was in the 90s when those new CPU gains meant entirely new games, effects, and software was possible. Now, it feels like just folks trying to squeeze off a few more FPS. Meh.
  • No one person at Intel will understand how all the microcode works, let alone the hardware. It is massive.

    So we need patch Tuesday for CPUs!

    • No one person at Intel will understand how all the microcode works, let alone the hardware. It is massive.

      There's obviously parts of the architecture that no one at Intel understands. Otherwise they could have brought out a version not vulnerable to MELTDOWN by now.

The moon is made of green cheese. -- John Heywood

Working...