Intel has released a new set of updates for the Meltdown and Spectre bugs that we first learned about in early January. It’s critically important to patch and update systems to avoid exposure to these flaws.
Intel’s strategy has been to fix its newest systems first, followed by the earlier models. The fix rollout hasn’t been smooth; Intel had to pull back an entire set of updates and fixes at one point because they caused frequent reboot issues. Those problems have been resolved to the best of our knowledge, and anyone with an Intel CPU from any generation should be updating as soon as possible.
Intel has been steadily updating its microcode document as new fixes roll out. This time around, we’ve got patches for the Ivy Bridge and Sandy Bridge families, plus various server variants of both chips, as well as some Haswell cores that weren’t previously covered. The chips that still need to be patched are all older than Sandy Bridge, including Intel’s 32nm Westmere parts (the first six-core CPUs based on Nehalem), the quad-core Nehalem architecture (Bloomfield, Lynnfield), and several mobile 32nm chips like Arrandale and Clarkdale.
In addition to patching up the entire Nehalem family tree, Intel will also be delivering patches for some older Core 2 Quad and Core 2 Duo processors, though these patches are still in the early stages of production. The company has taken heat for how it handled the unveil and rollout, but at least as far as the technical side of things, Intel seems to have the problem well in-hand with fixes dropping on a regular basis.
That’s a good thing, seeing as Spectre can be used to break the protections Intel offers with SGX (Software Guard Extensions). This latest research paper doesn’t identify a new attack in addition to the two Spectre variants, it just (“just”) illustrates how those two flaws can be used to crack into other secure repositories to give would-be thieves access to yet more information. That’s part of what makes Spectre and Meltdown serious. They’re not just flaws in and of themselves; they’re flaws that can be exploited to exfiltrate data out of other supposedly secure repositories.
If your motherboard manufacturer hasn’t issued any updates for your system, keep an eye on Windows Update. Microsoft has been delivering microcode updates for Intel systems, including through KB4090007. That update only runs through the end of February; it’s not clear if MS will create a new update to patch up Haswell and previous processors, or if it’ll keep the same KB number but roll up the latest changes. The performance impact of these patches on Sandy and Ivy Bridge still hasn’t been tested; newer CPUs have seen modest declines on the order of 5-7 percent, with a few outliers as high as 13 percent
AMD Releases Updated Risk Guidance on Meltdown, Spectre
AMD has clarified its own weaknesses against Spectre and Meltdown. One week later, things aren't quite as rosy as AMD hoped they'd be.
LG Shifts Strategy, Will No Longer Release Yearly Handset Updates
LG has declared its out of the yearly flagship phone release cycle, preferring to concentrate on retaining form factors for a longer period of time.
Intel Issuing Updates for Meltdown, Spectre Reboot Problem on Older Platforms
Intel's initial Meltdown and Spectre patches for older systems caused frequent reboots and other issues. The company thinks it has nailed those problems down.
Emergency Windows Update Removes Intel’s Buggy Spectre Patch
Microsoft has issued a rare out-of-cycle patch for Windows systems that removes Intel's Spectre patch. That has to be embarrassing for Intel.