{"id":5387,"date":"2018-04-05T00:49:00","date_gmt":"2018-04-04T22:49:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=5387"},"modified":"2018-04-04T23:50:25","modified_gmt":"2018-04-04T21:50:25","slug":"intel-no-microcode-updates-for-some-older-cpus","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2018\/04\/05\/intel-no-microcode-updates-for-some-older-cpus\/","title":{"rendered":"Intel: No Microcode Updates for some older CPUs"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/2018\/04\/04\/ausgepatcht-keine-update-fr-ltere-intel-cpus\/\" target=\"_blank\">German<\/a>]Intel has stopped developing microcode updates to close the meltdown vulnerability for older CPUs. This can be seen in the latest Intel Microcode Update Guidance revision. <\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/44ef189854cb4ce3869afd50d2539c02\" width=\"1\" height=\"1\">Originally Intel intended to offer microcode updates for all CPUs that are up to 5 years old to close the meltdown\/spectre 2 vulnerability. At least that was my understanding. German blog reader Stefan P. pointed out to me that Intel has changed its mind. <\/p>\n<h2>In March 2018 Intel has planned further updates<\/h2>\n<p>If you look at the Intel PDF document <a href=\"https:\/\/newsroom.intel.com\/wp-content\/uploads\/sites\/11\/2018\/03\/microcode-update-guidance.pdf\" target=\"_blank\">Microcode Update Guidance<\/a> dated March 6, 2018, you will not only find a list of CPUs for which microcode updates have been released. There are mentioned also more microcode update planned for near future. <\/p>\n<p><a href=\"https:\/\/i.imgur.com\/RdLnQcJ.jpg\"><img decoding=\"async\" title=\"Intel Microcode-Updates\" alt=\"Intel Microcode-Updates\" src=\"https:\/\/i.imgur.com\/RdLnQcJ.jpg\"><\/a>  <\/p>\n<p>I've addressed this within my blog post <a href=\"https:\/\/borncity.com\/win\/2018\/03\/12\/intel-spectre-meltdown-microcode-updates-march-11-2018\/\">Intel Spectre\/Meltdown Microcode Updates (March 11, 2018)<\/a>. <\/p>\n<h2>Intel stooped microcode update development<\/h2>\n<p>A new revision of the <a href=\"https:\/\/newsroom.intel.com\/wp-content\/uploads\/sites\/11\/2018\/04\/microcode-update-guidance.pdf\" target=\"_blank\">Microcode Update Guidance<\/a> from April 2, 2018, be available as a PDF document, changes some things. Browsing through the pages of this PDF document, shows entries like the ones shown below .<\/p>\n<p><img decoding=\"async\" title=\"Gestoppte Intel Microcode-Updates\" alt=\"Gestoppte Intel Microcode-Updates\" src=\"https:\/\/i.imgur.com\/4DT7jxy.jpg\"><\/p>\n<p>The microcode updates for Bloomfield, Bloomfield Xeon, Clarksfield, Gulftown, Harpertown Xeon C0 and E0, Jasper Forest, Penryn\/QC, SoFIA 3GR, Wolfdale family and the Yorkfield CPUs are listed as \"Stopped\". Intel gives the following reason for the'Stopped' status:<\/p>\n<blockquote>\n<p><strong>Stopped <\/strong>\u2013 After a comprehensive investigation of the microarchitectures and microcode capabilities for these products, Intel has determined to not release microcode updates for these products for one or more reasons including, but not limited to the following: <\/p>\n<p>\u2022 Micro-architectural characteristics that preclude a practical implementation of features mitigating Variant 2 (CVE-2017-5715) <br \/>\u2022 Limited Commercially Available System Software support <br \/>\u2022 Based on customer inputs, most of these products are implemented as \"closed systems\" and therefore are expected to have a lower likelihood of exposure to these vulnerabilities.<\/p>\n<\/blockquote>\n<p>Intel has stopped the development of microcode updates because the microarchitecture prevents the development of patches, the CPUs have 'little practical significance' or because customers use the CPUs in closed systems and do not expect any attacks there. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Intel has stopped developing microcode updates to close the meltdown vulnerability for older CPUs. This can be seen in the latest Intel Microcode Update Guidance revision.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[71,448,22],"tags":[1209,599,1216,1245],"class_list":["post-5387","post","type-post","status-publish","format-standard","hentry","category-computer","category-devices","category-update","tag-cpu","tag-intel","tag-meltdown","tag-spectre-2"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/5387","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=5387"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/5387\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=5387"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=5387"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=5387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}