Stone are aware that researchers have identified new potential security vulnerabilities including derivatives of the speculative execution side-channel analysis methods (known as Meltdown and Spectre) which were publicly disclosed in January 2018 and could potentially impact microprocessors used in some systems.

 

Exploitation of one or more of these vulnerabilities may theoretically facilitate the unauthorised exposure of privileged data.

 

We continue to urge all customers to keep their systems up to date. Additional information can be found on the following links:

 

Intel Blog – May 21 14:00 PDT – https://newsroom.intel.com/editorials/addressing-new-research-for-side-channel-analysis/

 

Intel Security First Website – https://www.intel.com/content/www/us/en/architecture-and-technology/facts-about-side-channel-analysis-and-intel-products.html

 

Intel Software Side Channel Security Site – https://software.intel.com/side-channel-security-support

 

Intel Security Advisory INTEL-SA-00115 – https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html