Intel has issued a statement confirming that BIOS patches for the Spectre vulnerability are causing reboots on Broadwell and Haswell systems.
The company wants us to know that it’s sticking to its recent commitment to put security first by confirming that it’s investigating an issue with the CPU microcode updates it issued to its hardware partners. These updates are being distributed to users’ systems as BIOS updates, which are just beginning to roll out.
Intel said that customers have reported “higher system reboots” after applying BIOS updates. So far, the issue only affects Broadwell (Core i3/5/7 5000 series on for mobile) and Haswell (Core i3/5/7 4000 series for desktop and mobile). Intel didn’t specifically say if Broadwell-E (Core i7 6000 series on desktop) are also affected. The issues have been reported in both data centers and regular user systems.
We are working quickly with these customers to understand, diagnose and address this reboot issue. If this requires a revised firmware update from Intel, we will distribute that update through the normal channels. We are also working directly with data center customers to discuss the issue.
Intel doesn’t recommend you ignore the BIOS updates from your system OEM, but you might want to wait for this to unfold if you’re using one of the affected CPUs. The BIOS fixes are used in conjunction with software fixes to mitigate Spectre Variant 2. If you have auto-updating turned on in your OS, then most likely you have already received the software side of the fix.
For all you people without a (real) choice, I pity you and wish you the best of luck.
For BIOS upgrades, luckily we're not at the point where they are also mandatory and our of our control.
Thanks for putting the Intel Series number (4000, etc) along with the product name (Haswell) in your article. I have a bunch of PCs here and that saved me a bunch of lookup time.
This particular problem is from a BIOS update, not from Windows 10.
In regards to the software, most desktop users won't see any significant degradation of performance. The ones who might see more of a performance impact is the server people - specifically the ones who have heavy I/O workloads along with heavy network I/O. I imagine the ones who run heavily-used game servers, over-subscribed virtual hosts, big OLTP db svrs, and other similar workloads might be able to see more of an impact.
If you think the problem is all Microsoft's fault, you have not read (or understood) much of the details about Meltdown/Spectre. You also don't really comprehend the potential for abuse here either.
I recommend you read the excellent articles posted here on Tom's, Ars Technica, and even Anandtech.
I can see you didn't read what I wrote, at all. I said "side effects" to the Win10 patches and I explicitly said that BIOS updates are still manual.