Thursday, February 8th 2018
Intel Deploys Microcode Update for Spectre Flaw on Skylake
In another step of our Spectre/Meltdown odyssey, Intel has started deployment of a fixed update for its Skylake processors, which aims to neuter chances of a malicious attacker exploiting the (now) known vulnerabilities. This update, which comes after a botched first update attempt that was causing widespread system reboots and prompted Intel to change its update guidelines, is only for the Skylake platform; other Intel CPUs' updates remain in Beta state, and there's no word on when they might see a final deployment.
The new microcode is being distributed to industry partners, so that they can include it in a new range of firmware updates that will, hopefully, end the instability and vulnerabilities present in current mobile and desktop Skylake implementations. Users of other Intel architectures will still have to wait a while longer before updates for their systems are certified by Intel, distributed to industry partners, and then trickle to end users via firmware updates.
Source:
ArsTechnica
The new microcode is being distributed to industry partners, so that they can include it in a new range of firmware updates that will, hopefully, end the instability and vulnerabilities present in current mobile and desktop Skylake implementations. Users of other Intel architectures will still have to wait a while longer before updates for their systems are certified by Intel, distributed to industry partners, and then trickle to end users via firmware updates.
15 Comments on Intel Deploys Microcode Update for Spectre Flaw on Skylake
I am strongly concidering going AsRock Taichi next time or Asus again even Gigabyte have some cool features like onboard Intel Thunderbolt others doesn't in the same price range.
If you want to avoid the issue entirely just buy AMD. Meltdown doesn't work on AMD processors and they are only vulnerable to 1 variant of spectre, of which has already been patched and doesn't carry a performance penalty. Heck, Zen+ is coming out next month.
In fact Gigabyte was pretty quick with the update, they just wrote a bad description.
Now let's see how much time before they realease the new microcode
Every thing intel has announced will likely be minimized the same way for a few years firmware/microcode from the start. Consumer wont worry about patches and updates. As far as baked in to the chip that will be well down the road. Years at least you'll be waiting a handful of years minimal for that.
Meaning. "Good luck, youre on your own, thanks for the money though."
My hp folio 1040 g2 laptop on the other hand, reboots a few times a week after the patch.
Corporate IT security apps like DLP seem to suffer the most from it in my experience.
AMD is only theoretically vulnerable to one of the two spectre variants and I say that because even AMD engineers have yet to exploit it on their processors.
www.amd.com/en/corporate/speculative-execution
"Differences in AMD architecture mean there is a near zero risk of exploitation of this variant. Vulnerability to Variant 2 has not been demonstrated on AMD processors to date." First, no, neither spectre requires a microcode fix
"We believe this threat can be contained with an operating system (OS) patch and we have been working with OS providers to address this issue. "
www.amd.com/en/corporate/speculative-execution
AMD has released OPTIONAL micro-code updates, and they are optional because AMD itself hasn't been able to show it is vulnerable to variant 2
"AMD will make optional microcode updates available to our customers and partners for Ryzen and EPYC"
Here's an official statement from ASRock
"Please refer to the AMD?�s announcement from following link.
www.amd.com/en/corporate/speculative-execution
The customer needs to software/OS update.
It does not affect the BIOS of the AMD motherboard.
Thank you
ASRock America Support Team"
Can't get any clearer than that. I really wish people will look this up before spreading misinformation.
They are simply going to distribute the microcode patches via Windows Update, someday, at any rate. That's what they mean by "OS patch." The microcode is still needed. Run InSpectre on any AMD PC post meltdown patch if you do not believe me.
However, you might want to read the statement update from a week later - 11th. I copy-pasted this directly from your link: Second one does. Intel's broken microcode updates saga has all been about this exact Spectre 2 mitigation. AMD states (in their statement quoted above from link you provided. also, you say it does yourself in the quote below) it will release microcode fixes for Spectre 2. I am not sure why you claim it is different. That optional part might be interesting. Linus was very annoyed with Intel when their patches had the apparent intent of defaulting Spectre mitigation to being turned off. Now AMD officially says their microcode updates are optional...
But in any case of the semantics of this whole security debacle, the performance impact on AMD processors are little to none (<1%).
"I am not sure why you claim it is different."
I'm not claiming anything different, I'm fricking quouting an official statement from one of AMD's motherboard vendors explicitly stating that BIOS updates are not needed. I just did and guess what, my AMD test rig is protected. Once again, I wish people would stop spreading false information.
There are example exploits out for AMD spectre variant 2 right now, btw. I think we all want the same thing then.