Intel has announced its fresh firmware updates for its Broadwell and Haswell processors to state the Spectre susceptibility. The company affected more often reboots and other uncertain issues soon after the initial round of Spectre fixes announced. Intel began functioning on updated microcode.
The company initially announced new firmware updates for its Skylake processors, and last week it released the availability of fixes for various other CPUs, containing Kaby Lake and Coffee Lake. The company had updated the existing list of available firmware fixes this week to describe that the patches for Haswell and Broadwell processors are also prepared for employing in production environments.
Fixes can be positioned in production environments are available for the following products as of February 28: Anniedale/Moorefield, Apollo Lake, Avoton/Rangeley, Broadwell (except Server EX), Broxton, Cherry View, Coffee Lake, Cougar Mountain, Denverton, Gemini Lake, Haswell (except Server EX), Kaby Lake, Knights Landing, Knights Mill, Skylake, SoFIA, Tangier, Valleyview/Bay Trail, and XGold. Beta fixes have been offered to OEMs for authentication for Gladden, some Ivy Bridge, Sandy Bridge, and Skylake Xeon E3 processors. The microcode updates for Broadwell and Haswell Server EX processors, specifically the Xeon E7v4 and E7v3 product families, are also in beta phase.
Updates are either in pre-beta or development phase as for the left over CPUs, but pre-mitigation microcode updates are available for quite many of such products. The fixes will be provided as OEM firmware updates and the device manufacturers began announcing BIOS updates to fix the Meltdown and Spectre susceptibilities presently after their announcement, but a great number of firms agreed to halt the updates as a result of variability problems. Certain merchants have now continued the delivery of firmware updates.
Meltdown threats are likely because of a susceptibility tracked as CVE-2017-5754, while Spectre threats are possible as a result of venerability tracked as CVE-2017-5753 (Variant 1) and CVE-2017-5715 (Variant 2). Meltdown and Spectre Variant 1 can be fixed with software updates, but Spectre Variant 2 needs microcode updates for a comprehensive patch.
Intel and AMD entitle they are functioning on processors that will have built-in defenses alongside these types of activities. Intel faces more than thirty lawsuits, containing ones filed by customers and owners, over the Meltdown and Spectre susceptibilities.