Intel issues Meltdown/Spectre fixes for Ivy Bridge, Sandy Bridge as patch effort winds down - seamanviespork
Intel
Intel's amended patches for its Ivy Bridge and Sandlike Bridge processor families have begun rolling kayoed to turn to Spectre and Nuclear meltdown vulnerabilities. With the waiver of the new code, just a few older processor families persist in the patch queue up.
According to Intel's microcode update document, patches for several processor families bear entered production, most notably the second-generation Core (Sandy Bridge) and tierce-propagation Core (Ivy Nosepiece) families. The patches also cover several, more niche architectures, so much as the Joy Xeon of the Friable Bridge generation, and the Broadwell Xeon chips.
Connected embellish are the Westmere Xeons, based upon 2010's first-propagation Core computer architecture, also as Westmere's predecessors, the Nehalem Xeon chips. Intel has issued genus Beta patches for these, too as some of the Arrandale and Clarkdale chips. The last mentioned families, which admit both mobile and desktop chips, began transportation in 2010 as advantageously.
The remainder of Intel's microcode guidance document shows just a few chip architectures ready and waiting for patches, including the remainder of the Arrandale and Clarkdale families. The even experienced Bloomfield Core processors are still waiting on patches to exit the pre-beta stage, as is the Clarksfield chip family. The latter, which included a Core i7 Extreme mechanized processor, shipped until 2012.
Chip architectures from otherwise companies, including AMD and Qualcomm, are susceptible to both the Spectre and Meltdown vulnerabilities. Intel's use of speculative execution techniques inside its microprocessors, however, ingest successful the fellowship's products particularly prone to endangerment from these threats. Soon later on the deuce vulnerabilities were publicly disclosed in early Jan, Intel began issuance patches for the affected processors, which included the bulk of its products. Unfortunately, those patches were found to cause scheme unbalance, forcing Intel to halt and then reissue new code.
Since then, Intel's patching teams have been steadily marching direct Intel's product lines, issuance updated encode. The updates to Intel's temporary hookup roadmap are current A of March 6, Intel same.
What this agency for you: Fortunately, no known attacks exploiting either Apparition or Meltdown have occurred. If you're worried about what to do, though, the answer is simple: patch, spell, patch. By now, Microsoft and many antivirus vendors have issued the appropriate patches, but if you'rhenium concerned that your Personal computer or motherboard vender hasn't delivered the appropriate patch, you can besides check Microsoft's internet site.
Note: When you purchase something later clicking links in our articles, we English hawthorn earn a small delegacy. Read our consort link policy for more details.
As PCWorld's senior editor, Mark focuses on Microsoft word and chip technology, among other beats. He has at one time written for PCMag, BYTE, Slashdot, eWEEK, and ReadWrite.
Source: https://www.pcworld.com/article/401674/intel-issues-meltdownspectre-fixes-for-ivy-bridge-sandy-bridge-as-patch-effort-winds-down.html
Posted by: seamanviespork.blogspot.com

0 Response to "Intel issues Meltdown/Spectre fixes for Ivy Bridge, Sandy Bridge as patch effort winds down - seamanviespork"
Post a Comment