![]() ![]() ![]() We say this because from Dell they have indicated that the BIOS update that allows solving/mitigating the Spectre vulnerability is causing the system to behave in an unstable manner.įrom Dell, they indicate that the bug is in the Intel proprietary component that has been included to update the BIOS of their computers. What happens to those users who have already made it? Well, they will have to wait in the same way for the manufacturer’s solution. ![]() Surely more than one user who has already opted for the update will not be surprised.įrom the manufacturer have just announced that all those users who have not yet carried out the update of their system are recommended to wait. Dell has been forced to make an announcement related to these updates. ![]() But this has not been the only remarkable case. We recently told you that Red Hat had removed this content because it caused instability in the system. The patching process of the Spectre update continues to be unsatisfactory in most situations. (Where an issue is found and multiple affected versions are in support then patches are typically released for all supported, affected versions but if 7.3 and 7.6 weren't in support at the same time this wouldn't apply.Chaotic situation to put an end to Spectre Dell: ‘Do No install Spectre BIOS Updates’ In general, if an issue is already fixed in an earlier release, the fix is incorporated into the mainline codebase from which subsequent releases will be formed. there would be no 7.6 patches available or necessary to apply for this issue. I would therefore expect that the changes made as hotfixes to 7.3 were already included in 7.6 at the point that 7.6 was released i.e. As I indicated above, I think that 7.6 was released some time after the publication of CTX231390 (and also after 7.3 went end-of-life). Hi Justin, apologies for the delayed response, I was away last week. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |