Intel will stop releasing patches for the Specter v2 security hole on some older CPUs
Recently, Intel has confirmed that it will stop updating the Meltdown and Specter security patches for certain products. No more microcode patches will be released in the future because the process of removing Specter v2 is too complicated and contains many risks.
In the microcode test guide, Intel said that after conducting a thorough check of microcode microstructures and performance on CPUs with a similar structure and patch that is no longer widely used. available on the market today (launched from about 10 years ago (2007-2011)), they made this decision.
If a particular processor falls into one of the following three categories, it will be on the list of receiving 'stop' confirmations in the new Intel documentation.
- Microstructure features on these CPUs tend to conflict and prevent some microcode features to overcome Specter v2 vulnerability (CVE-2017-5715).
- Current microcode updates are still quite limited in the ability to support commercial software systems.
- Most of these hardware products are closed systems, so the ability to 'stick' these security holes is quite low.
This list includes processors like Bloomfield, Bloomfield Xeon, Clarksfield, Gulftown, Harpentown Xeon C0 and E0, Jasper Forest, Penryn / QC, SoFIA 3GR, Wolfdale, Wolfdale Xeon, Yorkfield, Yorkfield Xeon and many other names Xeon, Core CPU, Pentium, Celeron and Atom series.
Currently, Intel is also implementing a number of measures to overcome security holes on some chips that have not received any previous updates such as Arrandale, Clarkdale, Lynnfield, Nehalem and Westmere.
See more:
- Intel faces a new vulnerability called BranchScope
- The new Specter vulnerability appears to be a new variant that easily 'crashes' secure partitions created by Intel SGX
- Intel released a new patch to fix the Specter and Meltdown vulnerabilities
You should read it
- Intel released a new patch to fix the Specter and Meltdown vulnerabilities
- Microsoft released an emergency patch for Windows, turned off the Specter patch, causing a drop in system performance
- Intel: After installing Specter / Meltdown vulnerability patch your computer will slow down to 10%
- The new Specter vulnerability appears to be a new variant that easily 'crashes' secure partitions created by Intel SGX
- Intel claims: New security updates help the computer to be 'immune' to Meltdown and Specter
- Instructions on how to fix blue screen error, cannot start when installing Microsoft patches
- New dangerous vulnerability in Intel CPU: Works like Specter and Meltdown, threatening all PCs and the cloud
- The new vulnerability on Intel allows hackers to take control of your computer within 30 seconds
- How to block Specter Variant 2 Patch on Windows 10
- How to know if your Windows computer is affected by Meltdown and Specter?
- Specter V2 vulnerability re-appears to attack Intel, Arm CPUs, AMD chips are not affected
- Instructions for checking the Specter vulnerability for the browser with Tencent's tool
Maybe you are interested
Should I buy Intel Core Ultra 5, 7 or 9 laptop CPU?
Qualcomm considers buying part of Intel's chip design division
How to use Apple Intelligence to summarize emails, web pages, and text
How to use Apple Intelligence writing tool on iPhone
Windows 11 24H2 Boosts Performance for AMD Ryzen Processors, But Not Intel
How are Intel's U, P and H chips different?