Intel finishes Spectre patching, some older CPUs won’t receive planned updates

Spectre Meltdown
(Image: IDGNS)



Read More:

4 April 2018 | 0

Intel’s months-long marathon of releasing CPU microcode patches to protect against critical Meltdown and Spectre exploits is ending, but some older processors that were promised firmware updates won’t be receiving them.

The chipmaker’s latest microcode revision update now says planned revisions are “stopped” for CPUs based on the Penryn (2007), Yorkfield (2007), Wolfdale (2007), Bloomfield (2008), Clarksfield (2009), Jasper Forest (2010), and Atom SoFIA (2015), as Tom’s Hardware first noticed.

Here’s Intel’s explanation of the new status:

“After a comprehensive investigation of the microarchitectures and microcode capabilities for these products, Intel has determined to not release microcode updates for these products for one or more reasons including, but not limited to the following:

-Micro-architectural characteristics that preclude a practical implementation of features mitigating Variant 2 (CVE-2017-5715)

-Limited Commercially Available System Software support

-Based on customer inputs, most of these products are implemented as “closed systems” and therefore are expected to have a lower likelihood of exposure to these vulnerabilities”.

This puts the final nail in the coffin for the Core 2 series of chips, where Intel’s first quad-core processors debuted. Some first-gen Core CPUs also get the axe, including the Intel Core i7-970, 980, 980X, and 990X.

The decision’s a bummer, but not really a surprise. It was more of a shock when Intel originally revealed its intention to create patches for decade-old chips, especially since the firmware updates get delivered via motherboard BIOS updates not from Intel directly. You have to wonder how many motherboard makers would’ve bothered creating BIOSes for ancient CPUs even if Intel released new microcode.

It’s a sour note to end on, but after a rough start, Intel delivered updates for about eight years’ worth of processors, including chips from the still-popular Sandy Bridge and Ivy Bridge era. Firmware updates are just part of the equation with the far-reaching CPU exploits, though.

RIP, Core 2. You’ll be missed.

IDG News Service

Read More:

Comments are closed.

Back to Top ↑