Thursday, January 18th 2018
BSODs from Meltdown and Spectre Firmware Updates Are Spreading Like the Plague
Have you ever taken your car to the mechanic shop to fix one thing but end up breaking another? Well, that's how Intel CPU owners are feeling right now. Intel previously confirmed that their Meltdown and Spectre firmware updates are causing irritating reboots on systems with Broadwell and Haswell processors. After analyzing the latest customer reports, they are acknowledging that the updates are also causing BSODs on the Kaby Lake, Skylake, Ivy Bridge, and Sandy Bridge platforms. This shouldn't come as a shocker considering how both the Meltdown and Spectre exploits affect Intel processors over the past 20 years. The possibility of all platforms suffering from the same side effects is extremely high. Fear not, though, as Intel is already working on an updated microcode to fix the constant system reboots. Motherboard vendors should have the beta microcode for validation by next week. Expect a new BIOS revision for your motherboard soon.
43 Comments on BSODs from Meltdown and Spectre Firmware Updates Are Spreading Like the Plague
Please, don't take these bugs lightly, it could be a costly mistake.
Maybe they mean internal testing.
something aint quite right with this patch..
trog
Part of the reason this vulnerability is so dangerous is people like you that leave their systems vulnerable. By the time you hear about widespread exploits, it will likely be too late for you.
According to this link all processors since Nehalem are affected and will be patched.
newsroom.intel.com/news-releases/intel-issues-updates-protect-systems-security-exploits/
This other says that the processors from 5 years or newer will be patched sooner, but I have an Ivy Bridge and I also received the patch a few days ago.
www.asus.com/News/V5urzYAT6myCC1o2
Program A issues an instruction which the CPU realizes can be sped up by fetching the next instruction, which it does by handing off a request to read, and load data at or from a memory address that it doesn't have access to, Windows memory manager sees this and to prevent access BSOD's your machine. Windows gets the patch (as its Windows Kernel and Memory Manager) but Intel has to provide microcode that either prevents the read request, modifying the request, or performing a lookup to see if the request is for data within the memory address space allocated to the thread that launched request, or prevent the read from occuring, which will cause a slow down in processing.