Stop installing our buggy Spectre CPU firmware fixes, Intel says - berglinsom
Gordon Mah Ung/IDG
The microcode patches designed to protect Intel processors against nasty Spectre CPU exploits have a big downside: They're forcing more shop reboots and other performance issues on some systems, including PCs that discharged in 2017. The problem is severe plenty that Intel is now recommending that usersnon install currently available patches and or else wait for new ones to be released.
"We sustain now known the root cause for Broadwell and Haswell platforms, and made good progress in development a answer to address it," Intel executive director V.P. Navin Shenoy aforesaid in a January 22 post. "We recommend that OEMs, cloud service providers, arrangement manufacturers, software vendors and end users stop deployment of on-going versions, as they may acquaint higher than expected reboots and opposite indeterminable system conduct."
The advice reverses Intel's previous guidance, which said users should install the CPU microcode patches despite the risk of more frequent organisation reboots. Although Shenoy's post only expressly mentions Broadwell and Haswell chips, Intel's new microcode alteration direction states that the advice applies to more Bodoni font chips as well.
Along Jan 11, Intel confirmed that the firmware patches prompted much sponsor reboots in Haswell (2013) and Broadwell (2014) systems. A week later, Intel revealed that many otherwise processor generations also succumb to the reboot bug: Sandy Bridge (2011), Ivy Bridge (2012), Skylake (2015), and Kaby Lake (2017). The January 22 firmware revision counsel says actual 8th-gen "Coffee Lake" CPUs are also affected by the issue.
"Over the weekend, we began rolling exterior an archaic version of the updated solution to industry partners for examination, and we will make a final firing available once that testing has been realised," Shenoy says.
Keep an eye out for those modern firmware updates, which will come with from your PC hardware vendor (HP, Dingle, Asus, et cetera) rather than Intel itself. Spectre attacks haven't been observed in the wild, but now that the exploits ingest been published, they're to be sure coming. AMD says its processors face "draw close-0" risk of exposure from the Spectre variant that requires a microcode update, simply it is nevertheless releasing optional firmware updates for its chips.
Attackers need to be able-bodied to run code on your PC to exploit the CPU flaws. Staying strong on the security front behind bread and butter malware that gives hackers entree to your PC off your PC. PCWorld's review of the best antivirus suites can assist you find solid protection. But guarding against these exploits requires more than security system software and fresh microcode. These flaws touch every aspect of your computer. Check out PCWorld's guide happening how to protect your PC against Meltdown and Spectre for everything you deman to get laid.
Editor's note: This article originally published on January 18, 2017, when Intel admitted the issue affects more than upright Broadwell and Haswell chips. It was updated on Jan 22 when Intel considered users to stopover installing the first set of Processor firmware patches.
Note: When you buy up something after clicking links in our articles, we may earn a wee mission. Read our affiliate link policy for more details.
Brad Chacos spends his days digging through desktop PCs and tweeting too much.
Source: https://www.pcworld.com/article/407844/spectre-cpu-patches-reboots-intel.html
Posted by: berglinsom.blogspot.com
0 Response to "Stop installing our buggy Spectre CPU firmware fixes, Intel says - berglinsom"
Post a Comment