Intel chip door renewable things, because the patch is also flawed, Intel is quietly suggesting that some customers do not worry about installing the patch.
The local time on January 11, the Wall Street Journal reported the above, and commented that the error shows that Intel is currently facing the complexity of the challenge.
The Wall Street Journal received a user-supplied, confidential document on January 10 local time, of which Intel said that it found three issues in the 'microcode' update released last week. The update is also known as Firmware - A processor-specific software update that differs from updates provided by operating system vendors such as Microsoft.
In a confidential document, Intel advises users to "delay the deployment of these microcode updates," the company said in a technical advisory that "Intel will continue to provide updates."
Stephen Smith, general manager of Intel's data center group, told the Wall Street Journal that the document is shared with computer makers and large cloud service providers because of reports that the updates could cause some computers to restart.
Stephen Smith said the bugs are "non-security." He added that the bugs were mainly on Intel's older PC and server chips, including the Broadwell processor in 2015 and the Haswell chip in 2013.
Stephen Smith also said that Intel advises customers to use firmware updates provided by computer manufacturers, but it is recommended that computer manufacturers and cloud service providers suspend the use of Intel firmware updates.
In an interview with The Wall Street Journal, independent security researcher Paul Kocher said he understands Intel's behavior given that Intel's chips are used in a very wide range and that some customers may use the chip in ways that Intel did not expect. Paul Kocher discovered The main security flaw in Intel chips that broke out weekly by the media was that he said "I would not be surprised because there are always some minor problems."
An Intel partner familiar with the file said that Intel's approach is problematic because the company only notified certain customers, but what really should be done is to completely stop the patch update, the partner said, The public has already received a microcode update, but has not been Intel's important technical reminder that do not use these updates'.
Stephen - Smith said in this regard, Intel plans on the issue of the company's official website to provide the latest information.
On January 3, Intel Corp. was exposed by technology media as chips flawed Spectre and Meltdown, which allows low-privilege, user-level applications to 'cross-border' access to system-level memory that can fool over Security check procedures to enable applications to access memory anywhere.
On January 9, Terry Myerson, executive vice president of Microsoft's Windows and Device Group, posted an article on Microsoft's official website titled Understanding the Effects of Specter and Meltdown on Slow Performance of Windows Systems, Security vulnerabilities will affect the computer and server performance.
The same day Microsoft made the above article, Intel also published an article on the official website entitled "Intel Security Update" article, said no one has been found to use these vulnerabilities access to user data, the user is advised to install patches in a timely manner, and that most Of computer users will not feel the significant slowdown caused by chip hole repair. According to the tests, most of these recently used computers slowed down mostly by less than 6%, basically in the 14% to 2% range.
In response, Microsoft believes the issue of speed reduction is more serious than Intel Corp. Expected to post a drop in speed of less than 10% for computers sold and loaded with Windows 10 operating system after 2016, Microsoft said in an article, It may be hard to detect, but for older computers, users will notice a significant slowdown as these devices use older chips, with devices previously shipped in 2015 running Windows 7 and Windows 8 Computer, will be the greatest impact.