Intel’s Microcode Revision Guidance for April 2018: 9 architectures won’t getting updates

Intel seems to change its mind, the latest Microcode Revision Guidance for April 2018 removed 9 architectures from the support list. In Intel's announcement, the company mentions some security enhancements. Removed and unsupported “After a comprehensive investigation of the microarchitectures and microcode capabilities for these products, Intel has determined to not release microcode updates for these products for... Continue Reading →

Advertisements

KB4100480 third attempt at a fix for the Meltdown security vulnerability

The out-of-band emergency update, KB4100480, was released by Microsoft last week to supplement a patch released in early March to address severe vulnerabilities accidentally introduced by Redmond's engineers in their January and February security updates for Meltdown on Windows 7 and Windows Server 2008 R2 systems. It seems that this patch is far away from being 'finished'. A patch for a... Continue Reading →

AMD Vs. CTS-Labs – Topic Closed

AMD responded in a community post what's really behind the claims from CTS-Labs - AMD makes it very clear that the issues identified by CTS-Labs research have very less to do with Meltdown & Spectre security holes, but there also telling us that these are associated with the firmware that manages the AMD Secure Processor (PSP)... Continue Reading →

Microsoft released KB4091663 & KB4091664 – Microcode Updates are rolling out

Microsoft, HP, Asus, ASRock & Co. rolling microcode updates out right now, ensure you checked if there is an BIOS update for you or not. Now, a bit late already Windows Build 1607 (Anniversary Update) and 1703 (Creators Update) getting Microcode Updates for all Skylake, Kaby Lake and Coffee Lake systems - the download of KB4091663 & KB4091664 is manual... Continue Reading →

Intel is working on another microcode update against Meltdown & Spectre

Intel has announced that it has released production microcode updates to OEM manufacturers for Kaby Lake, Coffee Lake, and Skylake platforms. And they have finally given us a schedule and availability table for the microcode revisions that can be found here. This update is already a bit late which means Intel is behind their own schedule but... Continue Reading →

Linux Kernel 4.15 against Meltdown & Spectre

Linus Torvalds released the final version of the first Linux kernel with Meltdown & Spectre fixes, the new version 4.15 comes with over 1000 changesets and this is mostly to address the current security issue. The new Kernel is now more compatible with VR and the free AMDgpu driver got implemented which means AMD Vega... Continue Reading →

Even with Meltdown & Spectre – Intel on a new high + new promises

I can't believe it, even with the Meltdown and Spectre leaks intel is on a new selling record. The stock exploded right after the Intel announcement that there will be a Meltdown & Spectre secure CPU release this year - which btw isn't enabled by default. According to CEO Brian Krzanich Intel is getting this... Continue Reading →

KB4073576 & KB4073578 fixes Win 7 / 8.1 AMD unbootable state issue

Microsoft released today an update for Windows 7 and 8.1 users, KB4073576 and KB4073578 designed to fix the unbootable state issue that some AMD devices ran into after installing the out-of-band security updates that Microsoft released last patchday. An update is available to fix the following issue that occurs after you install January 3, 2018—KB4056897 (Security-only update) or... Continue Reading →

Meltdown & Spectre Firmware Updates Causing Reboots for Some Intel Customers

Intel is currently looking into reports that some of its customers are experiencing reboots in systems that update to the latest firmware for Meltdown & Spectre mitigation. The systems affected are running Broadwell and Haswell processors. However, Intel still recommends end-users should apply the updates for both OS and hardware. Intel needs to straighten this up and... Continue Reading →

Blog at WordPress.com.

Up ↑

%d bloggers like this: