Update: This story has been up to date at 12:04 PM to incorporate Intel’s clarification of the brand new microcode.
If your PC consists of an Intel processor, it would doubtless obtain a mysterious new replace initially pushed out by the corporate on Friday.
Three issues about this launch are considerably regarding. First, Intel released the brand new CPU microcode as an “out of band” or unscheduled launch. Second, it covers nearly every little thing Intel has available on the market at the moment — relationship all the best way again to the 2017 Eighth-gen Core (“Coffee Lake”) chips. (The code itself is on the Intel GitHub web page, itemizing all the affected processors as much as and together with Intel’s most up-to-date Thirteenth-gen Core chips. Intel Xeons are affected, too.) Finally, the secretive and sudden nature of this patch raises eyebrows.
You don’t have to attempt to obtain and set up this code; motherboard distributors and even Microsoft itself will incorporate the safety launch inside updates for their very own merchandise. (Microsoft points its personal {hardware} drivers, particularly for the Surface notebooks and tablets it produces.) You can most likely count on that the brand new code will present up in a Windows replace or a BIOS replace from the board producer itself.
Like Microsoft, Intel sometimes publishes vulnerability info on what’s often called “Patch Tuesday,” or the primary Tuesday of the month. (As an instance, Intel released info noting that its Smart Campus Android app could possibly be used as a handheld Denial of Service (DOS) mechanism. Fun!) The undeniable fact that this code launch wasn’t scheduled on that day signifies that Intel wasn’t conscious of the vulnerability then, and felt it was vital sufficient to launch a patch on Friday relatively than ready for subsequent month.
So what’s all of the fuss about? We don’t know, though Intel did reply.
“Microcode 20230512 update released on May 12, 2023 does not contain any security updates and the note, [INTEL-SA-NA], is meant to convey that there are no applicable (Not Applicable) security updates in the package,” an Intel spokeswoman stated in an electronic mail. “The microcode update includes functional updates only (also documented in product erratum).”
So whereas we nonetheless don’t know what the microcode really fixes, Intel’s response offers us a greater concept that the microcode isn’t really a repeat of the Meltdown and Spectre bugs of 2018. That’s a reduction.
Author: Mark Hachman, Senior Editor
As PCWorld’s senior editor, Mark focuses on Microsoft information and chip expertise, amongst different beats. He has previously written for PCMag, BYTE, Slashdot, eWEEK, and ReadWrite.
…. to be continued
Read the Original Article
Copyright for syndicated content material belongs to the linked Source : PCWorld – https://www.pcworld.com/article/1917169/mysterious-new-intel-patch-surfaces-for-virtually-all-core-chips.html