- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
When the microcode update for the 2nd generation and 3rd generation Intel Core (Sandy Bridge/Ivy Bridge) processors for patching the Spectre and Meltdown vulnerabilities will be available?
Microcode update is required for branch target injection mitigation (Spectre).
Moreoover, for example the Intel(R) Core(TM) i7-2670QM CPU @ 2.20GHz (2nd Gen - Sandy Bridge) has also PCID capability, therefore the PCID performance optimization for Meltdown may be applicable.
Link Copied
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Intel committed to delivering all fixes by the end of the month. Any requests for information about missing microcode, microcode orders, etc. short of then are premature and a waste of everyone's time.
Intel Customer Support is not going to be able to provide you with any better answers; all they can do it point you to the primary web page.
...S
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Scot, thank for your information.
Is it possible to clarify if the microcode update released at 1/8/2018 (https://downloadcenter.intel.com/download/27431/Linux-Processor-Microcode-Data-File?product=873 https://downloadcenter.intel.com/download/27431/Linux-Processor-Microcode-Data-File?product=873) contains the Spectre and Meltdown patches ?
As I can understand not all processors listed in 1/8/2018 microcode have updated microcode for Spectre and Meltdown.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Yes, but not for all processors (basically a useless answer, I know).
...S
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Is there an accurate OFFICIAL processor model list with which Microcode has been patched and which not, to stop making speculations ...?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Everything is detailed on the main page: https://www.intel.com/content/www/us/en/architecture-and-technology/facts-about-side-channel-analysis-and-intel-products.html Facts about The New Security Research Findings and Intel Products. If the information isn't there or isn't linked from there (or isn't there in the form you want), it isn't available.
...S
[Edit: I know that a by-model list isn't provided. Know that you can use the string names for each family to search for specific models in that family at http://ark.intel.com/ Intel® Product Specifications (ark.intel.com).
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Well Intel decided to release a decent report at February 12 2018 that states that the microcode update for the Sandy Bridge desktop processors with CPUID 206A7 that includes the following Desktop/Mobile processors:
Intel® Core™ i3-21xx/23xx-T/M/E/UE Processor
Intel® Core™ i5-23xx/24xx/25xx-T/S/M/K Processor
Intel® Core™ i7-2xxx-S/K/M/QM/LE/UE/QE Processor
Intel® Core™ i7-29xxXM Extreme Processor
Intel® Celeron® Desktop G4xx, G5xx Processor
Intel® Celeron® Mobile 8xx, B8xx Processor
Intel® Pentium® Desktop 350, G6xx, G6xxT, G8xx Processor
Intel® Pentium® Mobile 9xx, B9xx Processo
Is for the moment at Pre-Beta stage.
https://newsroom.intel.com/wp-content/uploads/sites/11/2018/02/microcode-update-guidance.pdf https://newsroom.intel.com/wp-content/uploads/sites/11/2018/02/microcode-update-guidance.pdf
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Now it says in https://newsroom.intel.com/wp-content/uploads/sites/11/2018/03/microcode-update-guidance.pdf https://newsroom.intel.com/wp-content/uploads/sites/11/2018/03/microcode-update-guidance.pdf on page 12 for Sandy Bridge, e.q.
Intel® Core™ i7 - 2xxx - S/K/M/QM/LE/UE/QE Processor -> Production with New Production MCU Rev: 0x2D, but on the download page of the CPU (https://downloadcenter.intel.com/de/product/61275/Intel-Core-i7-2700K-Prozessor-8-MB-Cache-bis-zu-3-90-GHz- Downloads für Intel® Core™ i7-2700K Prozessor (8 MB Cache, bis zu 3,90 GHz) ) there is still only a microcode file from 17.11.2017. Why saying in production when there is no update to download?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I checked that page you linked and the microcode update is there now. For old systems like SandyBridge you can only update the microcode via https://labs.vmware.com/flings/vmware-cpu-microcode-update-driver VMWare CPU Microcode Update Driver at least until Microsoft updates https://support.microsoft.com/en-us/help/4090007 KB4090007. Due to the way that driver install process was designed you need both Intel and AMD microcode stacks. Fortunately the instructions from the driver download page are well written saving you the hassle of searching for microcode stacks. What they don't specifically mention is that Linux* Processor Microcode Data File can be extracted with 7-Zip.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
pal1000. Using VMWare CPU microcode updater won't help if you do not create Virtual Machines. That driver updates microcode too late for Windows kernel to make any effect in mitigation of Spectre v2/4 vulnerability.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Intel released all due microcodes on 7th August. Right now only for Linux. I suppose Microsoft will eventually follow suit.
https://downloadcenter.intel.com/download/28039/Linux-Processor-Microcode-Data-File?product=873 Download Linux* Processor Microcode Data File
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page