Intel will stop releasing patches for the Specter v2 security hole on some older CPUs
Recently, Intel has confirmed that it will stop updating the Meltdown and Specter security patches for certain products. No more microcode patches will be released in the future because the process of removing Specter v2 is too complicated and contains many risks.
In the microcode test guide, Intel said that after conducting a thorough check of microcode microstructures and performance on CPUs with a similar structure and patch that is no longer widely used. available on the market today (launched from about 10 years ago (2007-2011)), they made this decision.
If a particular processor falls into one of the following three categories, it will be on the list of receiving 'stop' confirmations in the new Intel documentation.
- Microstructure features on these CPUs tend to conflict and prevent some microcode features to overcome Specter v2 vulnerability (CVE-2017-5715).
- Current microcode updates are still quite limited in the ability to support commercial software systems.
- Most of these hardware products are closed systems, so the ability to 'stick' these security holes is quite low.
This list includes processors like Bloomfield, Bloomfield Xeon, Clarksfield, Gulftown, Harpentown Xeon C0 and E0, Jasper Forest, Penryn / QC, SoFIA 3GR, Wolfdale, Wolfdale Xeon, Yorkfield, Yorkfield Xeon and many other names Xeon, Core CPU, Pentium, Celeron and Atom series.
Currently, Intel is also implementing a number of measures to overcome security holes on some chips that have not received any previous updates such as Arrandale, Clarkdale, Lynnfield, Nehalem and Westmere.
See more:
- Intel faces a new vulnerability called BranchScope
- The new Specter vulnerability appears to be a new variant that easily 'crashes' secure partitions created by Intel SGX
- Intel released a new patch to fix the Specter and Meltdown vulnerabilities
You should read it
- Intel released a new patch to fix the Specter and Meltdown vulnerabilities
- Microsoft released an emergency patch for Windows, turned off the Specter patch, causing a drop in system performance
- Intel: After installing Specter / Meltdown vulnerability patch your computer will slow down to 10%
- The new Specter vulnerability appears to be a new variant that easily 'crashes' secure partitions created by Intel SGX
- Intel claims: New security updates help the computer to be 'immune' to Meltdown and Specter
- Instructions on how to fix blue screen error, cannot start when installing Microsoft patches
- New dangerous vulnerability in Intel CPU: Works like Specter and Meltdown, threatening all PCs and the cloud
- The new vulnerability on Intel allows hackers to take control of your computer within 30 seconds
- How to block Specter Variant 2 Patch on Windows 10
- How to know if your Windows computer is affected by Meltdown and Specter?
- Specter V2 vulnerability re-appears to attack Intel, Arm CPUs, AMD chips are not affected
- Instructions for checking the Specter vulnerability for the browser with Tencent's tool
Maybe you are interested
3 Apple Visual Intelligence Alternatives for Older iPhones
Intel releases new driver update package with 6GHz optimization and many other improvements
iPhone turns into 'heater' when using Apple Intelligence
How to turn off Apple Intelligence notifications summary
Intel Graphics Software Launched: Comprehensive Toolkit for Managing Intel Graphics Cards
Difference between ARM and Intel processors