Intel says recently issued patches for CPU security flaws might cause issues on older chips, vows to be more open about security

Intel says recently issued patches for CPU security flaws might cause issues on older chips, vows to be more open about security

The Spectre and Meltdown story continues to roll on, with Intel admitting that the updates it rolled out to tackle the CPU security flaws might have an adverse effect on older hardware.

In a statement on the company's website, GM of Intel's data centre group Navin Shenoy said that this problem was specific to the Broadwell and Haswell CPUs used in client and data centres.

The exec said that the hardware giant is working on a solution to this problem.

Intel has also pledged to be more open about security, with CEO Brian Krzanich penning an open letter to the tech industry.

"Following announcements of the Google Project Zero security exploits last week, Intel has continued to work closely with our partners with the shared goal of restoring confidence in the security of our customers’ data as quickly as possible," the Intel boss wrote.

"As I noted in my CES comments this week, the degree of collaboration across the industry has been remarkable. I am very proud of how our industry has pulled together and want to thank everyone for their extraordinary collaboration. In particular, we want to thank the Google Project Zero team for practicing responsible disclosure, creating the opportunity for the industry to address these new issues in a coordinated fashion."

Meanwhile, AMD has finally admitted that the Meltdown and Spectre security flaws found by Google Project Zero affect its chips. In a post on its website, the chip firm goes into how it plans to deal with these problems.

The company also said that its GPU hardware is not susceptible to these threats, answering speculation on the subject.

Incidentally, ARM has come out and said that only five per cent of its CPUs are vulnerable to these attacks. 

“ARM will address Spectre in future processors, but there will need to be an ongoing discipline in the design of secure systems, which needs to be addressed through both software and hardware,” ARM said in a statement to Bloomberg.

“In the meantime, we’re encouraging individual users to follow good security practices and reach out to their device-maker to get the latest software updates with Spectre mitigations.”

The year started out with the news that CPU chips were vulnerable to a number of attack vectors. This was thanks to research by Google's Project Zero team, and reported to hardware companies last summer, but this only entered the public domain last week.

PCGamesInsider Contributing Editor

Alex Calvin is a freelance journalist who writes about the business of games. He started out at UK trade paper MCV in 2013 and left as deputy editor over three years later. In June 2017, he joined Steel Media as the editor for new site In October 2019 he left this full-time position at the company but still contributes to the site on a daily basis. He has also written for, VGC, Games London, The Observer/Guardian and Esquire UK.