Get ready for new updates to guard against Spectre Intel's
fixed microcode updates to mitigate the Spectre attack have now reached Sandy Bridge and Ivy Bridge chips.
Not exact matches
While the Windows
update fixed the Meltdown problem, CPU
microcode updates from Intel delivered via a UEFI or BIOS
update are needed to fully enable protection against one of the Spectre attacks.
The mitigations for Meltdown and Spectre have involved a combination of software
fixes, such as Microsoft and Linux versions of «kernel page table isolation», and hardware
fixes such as Intel's
microcode updates.
Intel has finally released new
microcode updates to address the Spectre Variant 2 flaw in the older chips that triggered its across - the - board halt on early
fixes for the vulnerability.
Chips with production
fixes in Intel's
microcode update guidance document have been validated by Intel and approved for use in a production environment.
Bugs in Intel's
microcode updates for the Spectre Variant 2 attack have caused the most problems on patched systems, prompting HP and Dell to pause and roll back their respective BIOS
updates, while Microsoft this week issued a Windows
update that disabled Intel's
fix for Variant 2.
Microsoft has released an emergency Windows
update to disable Intel's troublesome
microcode fix for the Spectre Variant 2 attack.
All of the
fixes have OS kernel components, and some of the
fixes are combined with processor
microcode updates in addition to kernel
updates.
Microsoft said today that it would take Intel CPU
microcode updates meant to
fix the Spectre v2 vulnerability and ship these
updates to users via a Windows
update package.
bleepingcomputer.com - Microsoft said today that it would take Intel CPU
microcode updates meant to
fix the Spectre v2 vulnerability and ship these
updates to users via a Windows
update package.