If you are using earlier driver branches of the affected products, upgrade to a supported driver branch that contains the fix as listed in the tables for Windows and Linux.
Download the Nvidia GeForce 390.65 WHQL driver as released by NVIDIA. This new release adds an optimal gaming experience for Fortnite and adds NVIDIA Freestyle which lets you apply post-processing filters to your games while you play. The driver also introduces a security update against the Spectre variant 2 (CVE-2017-5753) vulnerability.
Nvidia just released a new driver, being a WHQL certified one. This new release adds an optimal gaming experience as well as a number of fixes, SLI and 3D Vision profiles. As always you know where you can grab the drivers directly from our download section. We have a discussion thread open on this driver here in our Nvidia driver discussion forums.
Game Ready
Provides the optimal gaming experience for Fortnite, including support for ShadowPlay Highlights in Battle Royale mode
Gaming Technology
Adds support for NVIDIA Freestyle which lets you apply post-processing filters to your games while you play.
R390.65 (r390_63-2) / 23.21.13.9065 (1-3-2018)
Added or updated the following SLI profiles:
DIRT 4
Total War: WARHAMMER II
X-Morph: Defense
Software Module Versions
nView - 148.92
HD Audio Driver - 1.3.36.6
NVIDIA PhysX System Software - 9.17.0524
GeForce Experience - 3.11.0.73
CUDA - 9.1
Fixed Issues in this Release
[GeForce GTX 970][Batman Arkham Knight]: Surfaces are rendered incorrectly.
[2016419]
[GeForce GTX 1080 Ti][TITAN X][TITAN Xp][Gamestream]: Artifacts appear when
using Gamestream. [1971680]
[Notebook][Fermi GPUs][3D Vision]: Error message pointing to the Stereo driver appears when enabling stereoscopic 3D. [200362512]
Fixed CVE-2017-5753
Computer systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
NVIDIA กำลังให้การอัปเดตการรักษาความปลอดภัยครั้งแรกเพื่อลดปัญหาด้านการเปิดเผยข้อมูลใหม่ ๆ ของ Google Project Zer ซึ่งรวมการประมวลผลของซีพียูเข้ากับช่องทางที่รู้จักกันดี
Intel CEO sold $39 million in company shares prior to disclosure of CPU security flaws
CEO Intel ขายหุ้น บริษัท จำนวน 39 ล้านเหรียญสหรัฐก่อนที่จะเปิดเผยข้อบกพร่องด้านความปลอดภัยของ CPU
A security flaw in Intel CPUs recently came to light that the company did its best to downplay, even as it put off releasing a comprehensive statement amid rising concerns about the possible performance impact of a fix. It's impossible to quantify how bad the situation actually is at this early point, although obviously it's not ideal.
What may be worse, however, is news that Intel CEO Bryan Krzanich unloaded millions of dollars of Intel shares?the maximum amount he was allowed to sell, in fact?after security researchers revealed the flaw to Intel, but before it became widely known to the public. An Intel representative told MarketWatch that the sale was unrelated to the security vulnerabilities, and the sale was made as part of a 10b5-1 plan, which as Investopedia explains is a mechanism that helps corporate insiders avoid accusations of insider trading by setting up plans to sell predetermined numbers of shares at a predetermined time.
In this case, Krzanich set up the plan just a month before the shares were sold, in the period between Intel's initial discovery of the exploit, but before its public disclosure. That in itself is not evidence of wrongdoing, and it's worth emphasizing that he is not facing any accusations of impropriety. However, the circumstances surrounding the sale may attract the attention of the SEC, particularly given its value, which was in excess of $39 million.
If it does opt to investigate, the scrutiny won't do Intel any favors. The announcement of the security vulnerability led to Intel's worst day on the market in eight months, and an SEC investigation isn't the sort of thing that's likely to inspire confidence in a quick bounce-back.
We've got a detailed rundown of the Meltdown and Spectre exploits, which despite Intel's reassurances "could be more far-reaching than any previous exploit." You can also see Meltdown in action here.
Intel CEO sold $39 million in company shares prior to disclosure of CPU security flaws
CEO Intel ขายหุ้น บริษัท จำนวน 39 ล้านเหรียญสหรัฐก่อนที่จะเปิดเผยข้อบกพร่องด้านความปลอดภัยของ CPU
A security flaw in Intel CPUs recently came to light that the company did its best to downplay, even as it put off releasing a comprehensive statement amid rising concerns about the possible performance impact of a fix. It's impossible to quantify how bad the situation actually is at this early point, although obviously it's not ideal.
What may be worse, however, is news that Intel CEO Bryan Krzanich unloaded millions of dollars of Intel shares?the maximum amount he was allowed to sell, in fact?after security researchers revealed the flaw to Intel, but before it became widely known to the public. An Intel representative told MarketWatch that the sale was unrelated to the security vulnerabilities, and the sale was made as part of a 10b5-1 plan, which as Investopedia explains is a mechanism that helps corporate insiders avoid accusations of insider trading by setting up plans to sell predetermined numbers of shares at a predetermined time.
In this case, Krzanich set up the plan just a month before the shares were sold, in the period between Intel's initial discovery of the exploit, but before its public disclosure. That in itself is not evidence of wrongdoing, and it's worth emphasizing that he is not facing any accusations of impropriety. However, the circumstances surrounding the sale may attract the attention of the SEC, particularly given its value, which was in excess of $39 million.
If it does opt to investigate, the scrutiny won't do Intel any favors. The announcement of the security vulnerability led to Intel's worst day on the market in eight months, and an SEC investigation isn't the sort of thing that's likely to inspire confidence in a quick bounce-back.
We've got a detailed rundown of the Meltdown and Spectre exploits, which despite Intel's reassurances "could be more far-reaching than any previous exploit." You can also see Meltdown in action here.
Smile if you have an AMD chip (for now).
Do Meltdown and Spectre affect AMD CPUs?
AMD claims that its CPU architecture is immune to the attacks, though this statement may have been made prematurely. Because exploits have different variants, current analyses only show that AMD CPUs are safe against the current version of Meltdown, which focuses primarily on Intel?s architecture. The Meltdown paper has the following statement:
"We also tried to reproduce the Meltdown bug on several ARM and AMD CPUs. However, we did not manage to successfully leak kernel memory with the attack described in Section 5, neither on ARM nor on AMD. The reasons for this can be manifold. First of all, our implementation might simply be too slow and a more optimized version might succeed. For instance, a more shallow out-of-order execution pipeline could tip the race condition towards against the data leakage. Similarly, if the processor lacks certain features, e.g., no re-order buffer, our current implementation might not be able to leak data. However, for both ARM and AMD, the toy example as described in Section 3 works reliably, indicating that out-of-order execution generally occurs and instructions past illegal memory accesses are also performed."
So far, then, AMD processors haven't been affected by Meltdown, but they're not immune against Spectre, which uses a wider range of speculative execution features. Spectre impacts CPUs from AMD, ARM, and Intel, and the cure may in some ways be worse than the disease, depending on how much it impairs performance.
Comment