Skip to main content
Articles

Intel warns that Specter patches may restart PCs

By January 18, 2018#!28Thu, 28 Feb 2019 10:44:35 -0300p3528#28Thu, 28 Feb 2019 10:44:35 -0300p-10America/Sao_Paulo2828America/Sao_Paulox28 28am28am-28Thu, 28 Feb 2019 10:44:35 -0300p10America/Sao_Paulo2828America/Sao_Paulox282019Thu, 28 Feb 2019 10:44:35 -03004410442amThursday=904#!28Thu, 28 Feb 2019 10:44:35 -0300pAmerica/Sao_Paulo2#February 28th, 2019#!28Thu, 28 Feb 2019 10:44:35 -0300p3528#/28Thu, 28 Feb 2019 10:44:35 -0300p-10America/Sao_Paulo2828America/Sao_Paulox28#!28Thu, 28 Feb 2019 10:44:35 -0300pAmerica/Sao_Paulo2#No Comments

Manufacturer says users should install updates anyway, as they protect their machines against CPU failure.

Firmware patches designed to protect Intel processors against Specter CPU failure They have quite a negative point: they are forcing more frequent reboots on some systems, including PCs released in 2017.

On January 11, Intel said that patches caused more frequent reboots on systems with Haswell (2013) and Broadwell (2014) processors. On Wednesday, 1/17, the company's executive VP, Navin Shenoy, revealed that many other generations of processors also suffer from this machine restart bug, including the following chips: Sandy Bridge (2011), Ivy Bridge (2012) ), Skylake (2015) and Kaby Lake (2017).

The only processors in the last five years that have run smoothly with patches - so far at least - seem to be the latest eighth generation Intel Core chips called Coffee Lake.

“We reproduce these problems internally and are making progress in identifying the cause of this. In parallel, next week we will release beta microcode for manufacturers to validate, ”says the Executive.

Even with this problem that restarts PCs, current firmware updates still provide valuable protection against potential attacks through the Specter vulnerability. "Intel recommends that partners maintain the availability of microcode updates already released to end users," the company said. “Intel does not recommend the removal of any updates that have already been made available to end users.”

In other words: install patches, live with these unwanted reboots for a while, and keep an eye out for upcoming security updates that will be released by companies.

 

Source: http://idgnow.com.br

Leave a Reply