Synopsis
Dans cet épisode hebdomadaire de janvier 2018, les animateurs analysent en profondeur les vulnérabilités critiques Spectre et Meltdown qui affectent la plupart des processeurs Intel et autres fabricants. Ils examinent l’impact de ces failles de sécurité sur les différents systèmes d’exploitation, les correctifs déployés par Apple, Microsoft et Intel, ainsi que les implications en termes de performance et de sécurité. L’épisode couvre également les réactions de l’industrie et les mesures de protection recommandées pour les utilisateurs.
Shownotes and Links
- Spectre et Meltdown
- Kernel-memory-leaking Intel processor design flaw forces Linux, Windows redesign
- Intel’s massive chip flaw could hit Mac where it hurts
- Intel Memory Access Design Flaw Already Addressed by Apple in macOS 10.13.2
- Understanding Meltdown & Spectre: What To Know About New Exploits That Affect Virtually All CPUs
- Intel responds to CPU security flaw as macOS 10.13.2 said to include fix for Macs
- Intel Claims Security Flaw Also Impacts Non-Intel Chips, Exploits Can’t Corrupt, Modify or Delete Data [Updated]
- Meltdown and Spectre
- Twitter - Alex Ionescu
- How Apple product users can protect themselves against Spectre and Meltdown CPU flaws
- About the security content of macOS High Sierra 10.13.2, Security Update 2017-002 Sierra, and Security Update 2017-005 El Capitan
- About speculative execution vulnerabilities in ARM-based and Intel CPUs
- Meltdown
- PDF’s /URI
- Negative Result: Reading Kernel Memory From User Mode
- Reading privileged memory with a side-channel
- Scary Chip Flaws Raise Spectre of Meltdown
- Genode OS Framework: Side-channel attacks (Meltdown, Spectre)
- Meltdown and Spectre
- Intel Says CEO Dumping Tons of Stock Last Year ‘Unrelated’ to Big Security Exploit
- Microsoft issues emergency Windows update for processor security bugs
- Intel Issues Updates to Protect Systems from Security Exploits
- How a researcher hacked his own computer and found ‘worst’ chip flaw
- Google says CPU patches cause ‘negligible impact on performance’ with new technique
- When F00F bug hit 20 years ago, Intel reacted the same way
- Apple & others say ‘little to no performance hit’ from security mitigations for CPU flaw
- CERT: Only way to fix Meltdown and Spectre vulnerabilities is to replace CPU
- Analysts suggest CPU security flaw won’t create long-term economic hit for Intel
- ARM security update suggests some iPhones, iPads, iPods and Apple TVs may be affected by CPU bug
- Apple: All Mac systems and iOS devices are affected by Meltdown and Spectre security flaws
- Apple Confirms ‘Meltdown’ and ‘Spectre’ Vulnerabilities Impact All Macs and iOS Devices, Some Fixes Already Released [Updated]
- How Linux is dealing with Meltdown and Spectre
- Notes from the Intelpocalypse
- Why raspberry pi isn’t vulnerable to spectre or meltdown
- Fixing the Meltdown and Spectre vulnerabilities
- Windows Client Guidance for IT Pros to protect against speculative execution side-channel vulnerabilities
- Meltdown et Spectre : failles qui réchauffent l’hiver
- Failles de sécurité dans les microprocesseurs : “Il va peut-être falloir changer de matériel”
- Meltdown et Spectre, les deux failles critiques découvertes dans la plupart des processeurs
- Comment se protéger des failles Spectre et Meltdown affectant les puces Intel
- Processeurs Intel : deux failles de sécurité touchent aussi les puces AMD et ARM
- Google’s Mitigations Against CPU Speculative Execution Attack Methods
- Meltdown (PDF)
- How to protect yourself from Meltdown and Spectre CPU flaws
- Spectre Attacks: Exploiting Speculative Execution (PDF)
- Homeland Security breach exposes data on 240,000 employees
- Téléphones mobiles personnels interdits à la Maison Blanche
- Un prince du “scam” arrêté aux USA
- Caméras de vidéo surveillance perturbées par des pirates
- Jugement de la FTC : Lenovo doit demander l’accord de ses clients pour les espionner
Crew
Crédits
Durée : 33m26s | Date : 06 janvier 2018