Spectre Ghost, Meltdown Fuse Two Security Vulnerabilities You Haven’t Forgotten, right? Because the problem appears at the hardware level, repair is also quite troublesome, the system, firmware patch can only be partially resolved, and easy to drag chronic energy, especially in Intel is quite embarrassing.
What about the newly released Comet Lake-S Tenth Generation desktop-class Core, given the lack of a truly new architecture, and intel’s recent generations of products that are still more or less of some variants of ghosts and fuse vulnerabilities?
Intel officials did not elaborate, and AnandTech learned after digging deep that Comet Lake-S, while still on the underlying architecture, was still the Skylake set that was born in 2015, but there were improvements in security, with two variants already largely resolved.
One is the fuse vulnerability variant V3a, called “Rogue System Register Read” (System Register Malicious Read), which was changed from the original firmware repair to the MCU (microcontroller unit) repair, indicating that the hardware design has been improved without the need to update the firmware.
The other is the fuse vulnerability variant V4, called the “ThinkStore Bypass” (predictive storage bypass), which is repaired from the firmware-operating system to the hardware-plus operating system, also defended from the hardware layer, but still appears to be assisted by system patches.
Other labor aspects, fuse V3, fuse V5 are hardware defense, ghost V1 or operating system plus virtual machine, ghost V2 is the firmware plus operating system.