Spectre flaw: Dell and HP pull Intel’s buggy patch, new BIOS updates coming

Jan. 24, 2018

Dell and HP have heeded Intel’s advice and stopped deploying BIOS updates carrying its buggy patch for the Spectre attack.

HP, the world’s biggest PC maker, has updated its advisory for the Meltdown and Spectre bugs following Intel’s advice on Jan. 22 to halt deploying the chip makers’ microcode or firmware patch due to unexpected reboots.

Intel early last week admitted its patch for Variant 2 Spectre (CVE-2017-5175) caused stability issues with its Broadwell and Haswell CPUs, and later confirmed the same problems affected Kaby Lake and Skylake CPUs.

HP on Jan. 23 pulled its softpaqs BIOS updates with Intel’s patches from its website, and on Jan. 25 will release a BIOS update with a previous version of Intel’s microcode.

Intel has prepared microcode updates for OEMs like HP and Dell that don’t trigger the reboots, but also don’t contain its patch for Variant 2, while leaving in place mitigations for Meltdown Variant 3 and Spectre Variant 1.

In the meantime it’s also developed a complete and—hopefully—stable patch for Broadwell and Haswell, but this is still being tested with OEMs. New microcode updates for Kaby Lake and Sky Lake will be released later.

“Once Intel reissues microcode updates, HP will issue revised Softpaqs,” said HP.

Dell’s updated advisory also notes it has removed its BIOS updates until Intel issues new stable firmware.

“Dell is advising that all customers should not deploy the BIOS update for the Spectre (Variant 2) vulnerability at this time. We have removed the impacted BIOS updates from our support pages and are working with Intel on a new BIOS update that will include new microcode from Intel,” it said.

The Variant 2 attack, known as “indirect branch speculation”, is considered the most difficult attack to mitigate against and carries the highest risk of virtualized environments in the cloud. Microsoft and Google have confirmed Intel’s mitigation for the Variant 2—IBRS or Indirect Branch Restricted Speculation—caused significant performance overheads on current hardware.

Google has developed its own mitigation for Variant 2 called Retpoline, which achieves IBRS’ goal without impacting performance. Retpoline has been integrated with the Linux kernel and offers a software-based mechanism to isolate indirect branches from speculative execution.

IBRS has been a source of contention among Linux kernel developers. In an email exchange with Linux kernel engineer David Woodhouse, Linus Torvalds called Intel’s patches “complete and utter garbage”.

Woodhouse pointed out that Retpoline mitigates against Variant 2 attacks on most Intel CPUs, but not fully on Skylake and so has recommended IBRS be only used on this generation of processors. Besides this, IBRS doesn’t have the same performance impact on Skylake as it does for older CPUs.

ZDNet has the full article

Sponsored Recommendations

The Healthcare Provider's Guide to Accelerating Clinician Onboarding

Improve clinician satisfaction and productivity to enhance patient care

ASK THE EXPERT: ServiceNow’s Erin Smithouser on what C-suite healthcare executives need to know about artificial intelligence

Generative artificial intelligence, also known as GenAI, learns from vast amounts of existing data and large language models to help healthcare organizations improve hospital ...

TEST: Ask the Expert: Is Your Patients' Understanding Putting You at Risk?

Effective health literacy in healthcare is essential for ensuring informed consent, reducing medical malpractice risks, and enhancing patient-provider communication. Unfortunately...

From Strategy to Action: The Power of Enterprise Value-Based Care

Ever wonder why your meticulously planned value-based care model hasn't moved beyond the concept stage? You're not alone! Transition from theory to practice with enterprise value...