Intel Releases Spectre Patches for Kaby Lake, Coffee Lake
Intel has announced a new set of updates for the Spectre attacks we’ve been talking about for the past six weeks or so. Spectre has two variants (Variant 1 and Variant 2). Meltdown, another critical security flaw, is considered to be Variant 3 and, in the x86 space, affects only Intel CPUs. We’re mostly focused on Spectre today, as patches for Meltdown should already have rolled out for Intel chips.
A month after Intel had to yank certain fixes for causing crashes and reboots, the company is back with stable updates for the Kaby Lake and Coffee Lake CPU families. In a recent blog post, Intel’s Navin Shenoy wrote:
[We] have now released production microcode updates to our OEM customers and partners for Kaby Lake- and Coffee Lake-based platforms, plus additional Skylake-based platforms. This represents our 6th, 7th and 8th Generation Intel Core product lines as well as our latest Intel Core X-series processor family. It also includes our recently announced Intel Xeon Scalable and Intel Xeon D processors for data center systems.
Intel has just released patches for Kaby Lake-H, S, X, and G, Kaby Lake Refresh U, Kaby Lake U, I, and U23E. It also strongly recommends keeping an eye out for UEFI updates, which is probably simpler than going nuts trying to figure out which precise Kaby Lake model you have.
Intel has released a 14-page document to spell out exactly where it is in the production process for each CPU family. There’s too much data to present in image form, but here’s a representative page showing update schedules on some of Intel’s CPUs.
Looking at this sample, we see that a number of fixes are in beta for the Ivy Bridge family, IVB-X and Jasper Forest are in “pre-beta,” and multiple Kaby Lake CPUs have UEFI updates in production already. A white background means a CPU is either in the “Planning” or “Pre-Beta” phase, a yellow background means the fix has moved to beta testing, and a green background means the fix is in production. As for the yellow background, that appears to mean the fix is new as of this revised guidance.
Overall, we’re glad to see these patches going in. They’re absolutely critical to securing PCs, and Spectre is no joke. At the same time, however, there’s some question as to whether Spectre can ever be considered “solved.” It’s easy to think of these as patches that “fix” Spectre, but the more accurate reading would be that Spectre is a class of vulnerabilities and variants, and that we’ve fixed two of the ways it can attack. White hats are going to be playing whack-a-mole on this for a very long time.
Continue reading
AMD’s Reliance on TSMC Isn’t Harming the Company’s Growth Prospects
It has been difficult to buy high-end PC components for nearly six months. There are a number of reasons for this, including pandemic-related impacts, the related surge in demand for all computing hardware, and supply shortages. A lot of eyeballs have been trained on foundries like TSMC, to the point that national governments have put…
AMD Discloses a Spectre-Like Vulnerability in Zen 3 CPUs
AMD has disclosed a potential security vulnerability on its Zen 3 CPUs with similarities to the Spectre attack from several years ago, but the company believes the risk is minimal.
Intel, Researchers Debate Whether New Spectre-Type Vulnerabilities Exist
Researchers are claiming to have found a new type of Spectre attack that bypasses all existing protections, but that framing isn't well supported.
LG Announces Monitor with Crazy 16:18 Aspect Ratio
LG's new panel eschews the ultrawide Zeitgeist for a monitor that's basically a really big square.