Intel will stop releasing patches for the Specter v2 security hole on some older CPUs
Recently, Intel has confirmed that it will stop updating the Meltdown and Specter security patches for certain products. No more microcode patches will be released in the future because the process of removing Specter v2 is too complicated and contains many risks.
In the microcode test guide, Intel said that after conducting a thorough check of microcode microstructures and performance on CPUs with a similar structure and patch that is no longer widely used. available on the market today (launched from about 10 years ago (2007-2011)), they made this decision.
If a particular processor falls into one of the following three categories, it will be on the list of receiving 'stop' confirmations in the new Intel documentation.
- Microstructure features on these CPUs tend to conflict and prevent some microcode features to overcome Specter v2 vulnerability (CVE-2017-5715).
- Current microcode updates are still quite limited in the ability to support commercial software systems.
- Most of these hardware products are closed systems, so the ability to 'stick' these security holes is quite low.
This list includes processors like Bloomfield, Bloomfield Xeon, Clarksfield, Gulftown, Harpentown Xeon C0 and E0, Jasper Forest, Penryn / QC, SoFIA 3GR, Wolfdale, Wolfdale Xeon, Yorkfield, Yorkfield Xeon and many other names Xeon, Core CPU, Pentium, Celeron and Atom series.
Currently, Intel is also implementing a number of measures to overcome security holes on some chips that have not received any previous updates such as Arrandale, Clarkdale, Lynnfield, Nehalem and Westmere.
See more:
- Intel faces a new vulnerability called BranchScope
- The new Specter vulnerability appears to be a new variant that easily 'crashes' secure partitions created by Intel SGX
- Intel released a new patch to fix the Specter and Meltdown vulnerabilities
You should read it
- Intel: After installing Specter / Meltdown vulnerability patch your computer will slow down to 10%
- The new Specter vulnerability appears to be a new variant that easily 'crashes' secure partitions created by Intel SGX
- Intel claims: New security updates help the computer to be 'immune' to Meltdown and Specter
- Instructions on how to fix blue screen error, cannot start when installing Microsoft patches
- New dangerous vulnerability in Intel CPU: Works like Specter and Meltdown, threatening all PCs and the cloud
- The new vulnerability on Intel allows hackers to take control of your computer within 30 seconds
- How to block Specter Variant 2 Patch on Windows 10
- How to know if your Windows computer is affected by Meltdown and Specter?
May be interested
- The new vulnerability on Intel allows hackers to take control of your computer within 30 secondswhile intel's meltdown and specter vulnerabilities have not been completely overcome, the world faces a new security vulnerability that allows hackers to take complete control of the user's device and attack time within 30 seconds.
- Overview of vulnerabilities on Intel, AMD, ARM chips: Meltdown and Spectertwo newly discovered major computer chip security bugs, called meltdown and specter, affect most of the devices manufactured in the last 20 years. the level of influence of these two security bugs on devices is still being calculated, but it can lead to the server on the cloud computing platform being compromised, leading to bad effects. than.
- Google and Microsoft announced new bugs on the CPU, update fixes will slow down the machine againmicrosoft and google jointly announced a new security hole on the cpu similar to meltdown and specter that was discovered earlier this year. also known as the speculative store bypass (variant 4), this latest vulnerability is similar to specter and exploits speculative execution techniques that cpus often use today.
- The new Specter vulnerability appears to be a new variant that easily 'crashes' secure partitions created by Intel SGXresearchers from the ohio state university have discovered a new dangerous variant of the specter vulnerability called sgxpectre with the ability to exploit information from safe partitions created by intel sgx.
- Google's CPU patch will not have much impact on the device thanks to new technologyfinally there is some good news for chip makers.
- What's the new generation of CPUs released by Intel?if you intend to build a laptop, you should not ignore the latest information about the new generation of cpus from intel.
- Apple confirmed that all Mac and iOS devices are affected by Meltdown and Specterafter days of complete silence, apple finally spoke up.
- Intel's chip has eight new serious vulnerabilitiesseveral weeks ago, google project zero security experts discovered eight new vulnerabilities in intel's chip design, which could directly lead to specter and meltdown, two vulnerabilities that negatively impacted performance. whole computer system.
- Microsoft and Intel cooperated to provide microcode updates for the CPU via Windows updatesmicrosoft and intel have teamed up to provide users with intel cpu microcode updates to overcome the specter v2 vulnerability through a windows update package.
- Some machines failed to boot after installing security patches for Internet Explorerthree days ago, microsoft had to release an emergency patch to prevent a security hole in internet explorer, but sadly this update caused a series of other serious problems.