Keep up to date with the most important stories and the best deals, as picked by the PC Gamer team.
You are now subscribed
Your newsletter sign-up was successful
Want to add more newsletters?
Every Friday
GamesRadar+
Your weekly update on everything you could ever want to know about the games you already love, games we know you're going to love in the near future, and tales from the communities that surround them.
Every Thursday
GTA 6 O'clock
Our special GTA 6 newsletter, with breaking news, insider info, and rumor analysis from the award-winning GTA 6 O'clock experts.
Every Friday
Knowledge
From the creators of Edge: A weekly videogame industry newsletter with analysis from expert writers, guidance from professionals, and insight into what's on the horizon.
Every Thursday
The Setup
Hardware nerds unite, sign up to our free tech newsletter for a weekly digest of the hottest new tech, the latest gadgets on the test bench, and much more.
Every Wednesday
Switch 2 Spotlight
Sign up to our new Switch 2 newsletter, where we bring you the latest talking points on Nintendo's new console each week, bring you up to date on the news, and recommend what games to play.
Every Saturday
The Watchlist
Subscribe for a weekly digest of the movie and TV news that matters, direct to your inbox. From first-look trailers, interviews, reviews and explainers, we've got you covered.
Once a month
SFX
Get sneak previews, exclusive competitions and details of special events each month!
As Intel continues to work on a fix for the reboot issue plaguing its botched Spectre microcode patch, several OEMs, including Dell, Acer, and AsRock, have recalled their BIOS patches.
The Spectre and Meltdown issues are composed of three vulnerabilities, each with its own designation in the Critical Exposure and Vulnerability (CVE) list. Meltdown is designated as CVE-2017-5754, while Spectre has two components: CVE-2017-5753 and CVE-2017-5715. Out of the three, CVE-2017-5715 is the only one that requires updates to the CPU microcode, which needs to be implemented through the BIOS.
Dell has updated its patch guide to remind its users to not install the update.
“Dell is advising that all customers should not deploy the BIOS update for the Spectre (Variant 2) vulnerability at this time. We have removed the impacted BIOS updates from our support pages and are working with intel on a new BIOS update that will include new microcode from Intel.”
Acer added a similar statement to its patch guide.
“At this time, we do not recommend updating your BIOS if your system has a Core i CPU from the 4th (Haswell) or 5th (Broadwell) generation, as it may cause system instability.”
Almost all OEMs are asking its users to roll back to a previous version of the BIOS until a proper fix is released. The BIOS rollback will only revert the patch for Spectre CVE-2017-5715, and will not affect fixes for the other two vulnerabilities.
Keep up to date with the most important stories and the best deals, as picked by the PC Gamer team.
Most manufacturers now have updated patch guides on their respective websites detailing the reversion process.

