MSFN is made available via donations, subscriptions and advertising revenue. The use of ad-blocking software hurts the site. Please disable ad-blocking software or set an exception for MSFN. Alternatively, register and become a site sponsor/subscriber and ads will be disabled automatically.
Search the Community
Showing results for tags 'Spectre'.
Found 2 results
VMware CPU Microcode Update Driver: https://labs.vmware.com/flings/vmware-cpu-microcode-update-driver Linux Processor Microcode Data File Version: 20180108 (Latest) Date: 1/8/2018: https://downloadcenter.intel.com/download/27431/Linux-Processor-Microcode-Data-File?v=t I am on a i3 3225 Win7x64 PC, followed instruction on page https://labs.vmware.com/flings/vmware-cpu-microcode-update-driver#instructions and was able to confirm on "Event Viewer" "Successfully updated microcode on one or more CPUs". Unfortunatelly after running SpecuCheck I got this: NOTE: Wasn't able to run PowerShell script on my win7x64 so that's why I ran SpecuCheck. Of course KB4056897 was installed on my system before doing all this. VMware program did work (as I confirmed), but in file "microcode-20180108.tgz" Intel Microcode Data File for my i3 3225 was not patched for this vulnerabilities. So this means Intel is launching this file "microcode-20180108.tgz" to public and not all Microcode Data have been updated to fix this vulnerabilities and no mention to this on download page. INTEL HAS LOST ALL CREDIBILITY FOR ME. Somebody with a newer Processor should check this in order to verify if Intel has fixed this on recent Processors. alacran