Intel updates Spectre fixes for Haswell and Broadwell

by Mark Tyson on 1 March 2018, 10:12

Tags: Intel (NASDAQ:INTC)

Quick Link: HEXUS.net/qadrcf

Add to My Vault: x

About a week ago HEXUS reported upon Intel's all-new patches for 6th-gen (Skylake, 100 series chipsets), 7th-gen (Kaby Lake, 200 series chipsets), and 8th-gen (Coffee Lake, 300 series chipsets) motherboards / CPUs. The firm had, at last, managed to update its updates and had tested them thoroughly enough to assure users that they wouldn't again be the cause of instability and random reboots.

Intel has now refreshed its Microcode Update Guidance PDF to show that it has updated its fixes for Spectre vulnerabilities, for 4th-gen (Haswell) and 5th-gen (Broadwell) platforms. We know this because the Haswell and Broadwell parts in the guidance table are now highlighted in green which signifies "Intel has completed all validation and is authorizing customers to use this MCU in a production environment."

This is good news, as there are a lot of Haswell and Broadwell generation processor users out there. However this isn't the end of the story to get patched, it requires that your system vendor or motherboard vendor takes Intels update code and issues a BIOS update for you.

If you are a Sandy Bridge or Ivy Bridge platform user, consulting the new Microcode Guidance table, Intel's updated patches are still in beta at this time. Updates will go back even further than this though. It is indicated that there will be Spectre patches coming to processors / platforms as far back as Wolfdale (the Conroe die shrink from 2007).

Sadly, previous testing, including tests from Microsoft's labs, indicates that older processor models, and older versions of Windows, can run noticeably slower when patched.



HEXUS Forums :: 14 Comments

Login with Forum Account

Don't have an account? Register today!
It's good news that both my Haswell-E i7-5930K and Broadwell-E i7-6900K processors are getting the update code.

I will just have to keep an eye on the MSI site to check for Bios updates.
Looking forward to revised benchmarking with the patched chips. No word of Meltdown fixes yet Hexus?
Given the performance impact and the exploit requires local execution I was going to go with not updating. I'm ultra careful with what I download and run anyway and don't go to dodgy websites. I may not have a choice as my mobo manufacturer doesn't look like they're going to do it anyway.
it requires that your system vendor or motherboard vendor takes Intels update code and issues a BIOS update for you.

I just can't see this happening for a large number of users, especially for even older systems.
ohmaheid
Looking forward to revised benchmarking with the patched chips. No word of Meltdown fixes yet Hexus?

Those were patched at the OS-level, if you're on W10 you're already fixed (windows patch came out almost 2 months ago)