Sunday, July 22, 2018
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Samsung to Showcase Large QLED, microLED TVs Net Year
Google, Facebook, Microsoft, and Twitter Partner on New Data Project
Foxconn Breaks Ground in In Wisconsin Plant, Looks at AI and Beyond Apple
Western Digital and Toshiba Begin Sampling 96-layer QLC NAND
Cloud Services Keep Boosting Microsoft's Revenue
Comcast Won't Pursuit Fox assets, Focuses on Sky Offer
EU to Probe Qualcomm Over Pricing Case
Google's Project Fuchsia Could Be The Successor of Android Successor to Android
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > PC Parts > Intel R...
Last 7 Days News : SU MO TU WE TH FR SA All News

Friday, March 09, 2018
Intel Releases Meltdown and Spectre fixes for Ivy Bridge, Sandy Bridge


Intel has made available microcode updates for the Ivy Bridge and Sandy Bridge processor families, designed to address Spectre and Meltdown vulnerabilities.

According to Intel's microcode update document (March 6), patches for several processor families have entered production, most notably the second-generation Core (Sandy Bridge) and third-generation Core (Ivy Bridge) families. The patches also cover architectures including the Gladden Xeon of the Sandy Bridge generation, and the Broadwell Xeon chips.

Westmere Xeons, based upon 2010's first-generation Core architecture, as well as Westmere's predecessors, the Nehalem Xeon chips, are also ready to be patched, according to the document. Intel has issued beta patches for these, as well as some of the Arrandale and Clarkdale chips.

Other chip architectures are still waiting for patches, including the remainder of the Arrandale and Clarkdale families.

Soon after the Spectre and Meltdown vulnerabilities were publicly disclosed in early January, Intel began issuing patches for the affected processors, which included the bulk of its products. Unfortunately, those patches were found to cause system instability, forcing Intel to halt and then reissue new code.

Curently no known attacks exploiting either Spectre or Meltdown have occurred.



Previous
Next
Broadcom and ST Chips Power the new Galaxy S9: Teardown        All News        Researchers Create Promising Flexible Electronics Based on Carbon Nanotubes
SSD Price Drop Will Drive the Adoption Rate of SSD in Notebooks     PC Parts News      Western Digital to Inject $4.6bn in Toshiba Memory

Get RSS feed Easy Print E-Mail this Message

Related News
Micron and Intel to End Their 3D XPoint Joint Development Partnership
Microsoft Calls for Public Regulation of AI Face Recognition Software
Intel to Buy eASIC to Expand Its Portfolio Beyond Processors
New Intel Xeon E-2100 Processor Targets Entry-level Workstations
Facebook Launches AR Ads
Samsung Wins at Two Top Global AI Machine Reading Comprehension Challenges
Baidu Unveils High-Performance Kunlun AI Chip, AI Partnerships With Intel
Intel May Lose Apple as a Modem Client for the iPhones
Samsung Keeps The Lead in the Semiconductor Market, followed by Intel and SK Hynix
AI Algorithms Crushed Human Players in Dota 2 Video Game
AMD's 7nm Processors to Compete With Intel's 10nm Chips
Intel CEO Brian Krzanich Resigns After Found to Have Relationship With Employee

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2018 - All rights reserved -
Privacy policy - Contact Us .