Intel fixed the Meltdown and Spectre vulnerabilities allow speculative execution side-channel attacks, specifically CVE-2017-5715, CVE-2017-5753, CVE-2017-5754 but only for modern CPUs. Essentially CPUs sold running with Windows 10 pre-installed on the machines, leaving a larger part of CPUs unsupported.
Check Intel's official support page for CPUs fixed.
Not to be detered Eran "Regeneration" Badit created the Intel Microcode Boot Loader, which fixes this but in a round-about perhaps uncomfortable way, you have have plugged in a USB stick with the fix every time you boot the computer.
The tool will use the Intel BIOS Implementation Test Suite (BITS) and the Syslinux bootloader to automatically detect and apply the most current microcodes for an Intel processor. This allows computer using old processors to become protected.
See Intel Microcode Boot Loader official post for instructions to install.
The current release includes the latest ucodes for 392 Intel CPUs produced from 1996 to 2018.
Check Intel's official support page for CPUs fixed.
Not to be detered Eran "Regeneration" Badit created the Intel Microcode Boot Loader, which fixes this but in a round-about perhaps uncomfortable way, you have have plugged in a USB stick with the fix every time you boot the computer.
The tool will use the Intel BIOS Implementation Test Suite (BITS) and the Syslinux bootloader to automatically detect and apply the most current microcodes for an Intel processor. This allows computer using old processors to become protected.
See Intel Microcode Boot Loader official post for instructions to install.
The current release includes the latest ucodes for 392 Intel CPUs produced from 1996 to 2018.
No comments:
Post a Comment