Recommended

Intel Confirms Patches for Meltdown and Spectre Bugs Affect Even Newer Generations of CPUs

Intel recently confirmed that the performance of a number of CPU chips, even those of the newer generations, will be affected by the system updates meant to fix the Meltdown and Spectre security vulnerabilities.

Intel executive vice president Navin Shenoy addressed their customers and industry partners in a recent blog post and detailed the developments in the firmware updates they are working on to continuously resolve the massive effects of Meltdown and Spectre.

"We have now issued firmware updates for 90 percent of Intel CPUs introduced in the past five years, but we have more work to do," Shenoy said.

Get Our Latest News for FREE

Subscribe to get daily/weekly email with the top stories (plus special offers!) from The Christian Post. Be the first to know.

The Intel executive added that the released firmware updates have been "effective at mitigating exposure to the security issues." However, he recognized that these patches have caused "frequent reboots" on updated computers.

Shenoy then confirmed that the computer reboots were experienced on systems powered by Ivy Bridge-, Sandy Bridge-, Skylake-, and Kaby Lake-based platforms, among others.

Following the reports gathered, Intel is performing internal tests to reproduce the reboot issues and Shenoy assured people that the microchip-making company was "making progress toward identifying the root cause."

After the tests, which will presumably end next week, the company will issue a "beta microcode" of another security patch to various vendors and computer makers so this can be validated as good for applying on specific computer models.

Shenoy also posted updates on the performance tests they were conducting in data centers. "These results are run on industry standard benchmarks and are helpful, but we understand that what ultimately matters to our customers is their own workloads," Shenoy explained of the experiments.

"As expected, our testing results to date show performance impact that ranges depending on specific workloads and configurations. Generally speaking, the workloads that incorporate a larger number of user/kernel privilege changes and spend a significant amount of time in privileged mode will be more adversely impacted," Shenoy further explained.

Was this article helpful?

Help keep The Christian Post free for everyone.

By making a recurring donation or a one-time donation of any amount, you're helping to keep CP's articles free and accessible for everyone.

We’re sorry to hear that.

Hope you’ll give us another try and check out some other articles. Return to homepage.

Most Popular

More Articles