Monday, January 22nd 2018
Intel Announces Root Cause of Meltdown, Spectre Patch Reboot Issue Identified
Intel has finally come around towards reporting on the state of the reboot issues that have been plaguing Intel systems ever since the company started rolling out patches to customers. These patches, which aimed to mitigate security vulnerabilities present in Intel's chips, ended up causing a whole slew of other problems for Intel CPU deployment managers. As a result of Intel's investigation, the company has ascertained that there were, in fact, problems with the patch implementation, and is now changing its guidelines: where before users were encouraged to apply any issued updates as soon as possible, the company now states that "OEMs, cloud service providers, system manufacturers, software vendors and end users stop deployment of current versions, as they may introduce higher than expected reboots and other unpredictable system behavior." A full transcription of the Intel press release follows."As we start the week, I want to provide an update on the reboot issues we reported Jan. 11. We have now identified the root cause for Broadwell and Haswell platforms, and made good progress in developing a solution to address it. Over the weekend, we began rolling out an early version of the updated solution to industry partners for testing, and we will make a final release available once that testing has been completed.
Based on this, we are updating our guidance for customers and partners:
I will keep you updated as we learn more and thank you for your patience."
Sources:
Intel NewsRoom Reboot Issues, Intel newsRoom Udpated Guidance
Based on this, we are updating our guidance for customers and partners:
- We recommend that OEMs, cloud service providers, system manufacturers, software vendors and end users stop deployment of current versions, as they may introduce higher than expected reboots and other unpredictable system behavior. For the full list of platforms, see the Intel.com Security Center site.
- We ask that our industry partners focus efforts on testing early versions of the updated solution so we can accelerate its release. We expect to share more details on timing later this week.
- We continue to urge all customers to vigilantly maintain security best practice and for consumers to keep systems up-to-date.
I will keep you updated as we learn more and thank you for your patience."
41 Comments on Intel Announces Root Cause of Meltdown, Spectre Patch Reboot Issue Identified
What the actual f###
Im on an Amd Fx with all the latest patches and im seeing a lot of system hangs atm maybe unconnected since i mess with sliders and tune settings like theirs a prize involved but I'm just carrying on as Normal to be fair which to me makes more hangs someone elses fault:)
It's probably because, as Linus hinted, the performance hit is huge & even then the (software) fix may not be 100% secure.
It seems that my point of view from the start of all this, not downloading beta software created in a panic and waiting for the final patch, was right. A lot of people on this forum criticized me for saying that is the way to go. I dare anyone, now after even Intel says you should uninstall the cancer patch they created, to tell me that I was wrong. Are there still any takers out there?
Good God, it's a damn good thing that AMD has come back from behind because damn if I ever buy another Intel chip after this garbage that Intel has just handed us. #IntelFail #AMDFTW
Does anyone know of a list of the various processor microcode numbers that are affected?
My 6700K is currently on C2.
is this an esports match? a more humble attitude would make the points more clear, otherwise it's really hard to care to listen through the filler during an important topic such as security that is out of the user's control... nobody needs to know how much of a victim you were, not everyone read the previous threads
linus torvalds very recently was infuriated (with F bombs) about the intel 'garbage' being requested into the linux kernel, this isnt something to boast about, it's a very disappointing situation...
plus, controlling a few windows updates doesnt mean you're controlling the intial OS state, or the browsers losing performance, or not being able to undo specific items from a service pack, etc
launchpad.net/ubuntu/+source/intel-microcode/3.20180108.0+really20170707ubuntu17.10.1 If I'm reading this correctly, it is telling me that microcode was reverted back to the version from July last year because this regression was so bad, that it's almost like Intel conceding that their fix was worse than the security hole it was attempting to patch. :fear:
dont think about the date, microcode isnt supposed to have updates every month
Also:launchpad.net/ubuntu/artful/+source/intel-microcode/+copyright
w3techs.com/technologies/history_details/os-linux
w3techs.com/technologies/details/os-linux/all/all