{"id":11074,"date":"2018-01-11T10:31:07","date_gmt":"2018-01-11T18:31:07","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/01\/11\/news-4845\/"},"modified":"2018-01-11T10:31:07","modified_gmt":"2018-01-11T18:31:07","slug":"news-4845","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/01\/11\/news-4845\/","title":{"rendered":"Microsoft reinstates Meltdown\/Spectre patches for some AMD processors \u2014 but which ones?"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/01\/meltdown-spectre-100746622-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Thu, 11 Jan 2018 09:38:00 -0800<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">As we rappel down the Patch Tuesday rabbit hole this month, Microsoft just announced that it\u2019s going to start pushing its January Windows security patches onto AMD processors again. But it neglects to mention which ones. Per a late-night <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073707\/windows-os-security-update-block-for-some-amd-based-devices\" rel=\"nofollow\"><span style=\"font-weight: 400;\">change to KB 4073707<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft has resumed updating the majority of AMD devices with the Windows operating system security update to help protect against the<\/span><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180002\" rel=\"nofollow\"> <span style=\"font-weight: 400;\">chipset vulnerabilities<\/span><\/a><span style=\"font-weight: 400;\"> known as Spectre and Meltdown.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A small subset of older AMD processors remain blocked to avoid users getting into an unbootable state after installation of recent Windows operating system security updates. Microsoft is working with AMD to resolve this issue and should resume Windows OS security updates to this subset of AMD processors via Windows Update and WSUS by next week. For AMD device-specific information please refer to AMD\u2019s<\/span><a href=\"https:\/\/www.amd.com\/en\/corporate\/speculative-execution\" rel=\"nofollow\"> <span style=\"font-weight: 400;\">Security Advisory<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Of course, AMD\u2019s Security Advisory has very little information \u2014 and no mention at all about which AMD processors were originally removed from the list, and which are now apparently back on the patch list.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Conspicuously, this paragraph has been pulled from KB 4073707:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft has resumed updating the majority of AMD devices with the Windows operating system security update to help protect against the<\/span><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180002\" rel=\"nofollow\"> <span style=\"font-weight: 400;\">chipset vulnerabilities<\/span><\/a><span style=\"font-weight: 400;\"> known as Spectre and Meltdown.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Which makes me wonder if Microsoft is still pointing the finger at AMD, or if the two have somehow come to a resolution of their spitting contest.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Which processors are now getting the Meltdown\/Spectre treatment, and which \u201csmall subset of older AMD processors remain blocked\u201d? Who knows. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The only information I\u2019ve found about specific models comes from Dr. Adrian Wong on <\/span><a href=\"https:\/\/www.techarp.com\/articles\/windows-10-updates-bricking-amd-pc\/\" rel=\"nofollow\"><span style=\"font-weight: 400;\">the TechArp site<\/span><\/a><span style=\"font-weight: 400;\">, who lists Athlon, Opteron, Sempron, Turion, A10 and Ryzen processors. He doesn\u2019t mention which, if any, of those are now receiving patches.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Thx, @MrBrian.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Questions? Get your Athlon over to the <\/span><\/i><a href=\"https:\/\/www.askwoody.com\/2018\/microsoft-apparently-reinstates-meltdown-spectre-patches-for-some-amd-processors\/\" rel=\"nofollow\"><i><span style=\"font-weight: 400;\">AskWoody Lounge<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">.<\/span><\/i><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3247744\/microsoft-windows\/microsoft-reinstates-meltdownspectre-patches-for-some-amd-processors-but-which-ones.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/01\/meltdown-spectre-100746622-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Thu, 11 Jan 2018 09:38:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">As we rappel down the Patch Tuesday rabbit hole this month, Microsoft just announced that it\u2019s going to start pushing its January Windows security patches onto AMD processors again. But it neglects to mention which ones. Per a late-night <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073707\/windows-os-security-update-block-for-some-amd-based-devices\" rel=\"nofollow\"><span style=\"font-weight: 400;\">change to KB 4073707<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<blockquote>\n<p><span style=\"font-weight: 400;\">Microsoft has resumed updating the majority of AMD devices with the Windows operating system security update to help protect against the<\/span><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180002\" rel=\"nofollow\"> <span style=\"font-weight: 400;\">chipset vulnerabilities<\/span><\/a><span style=\"font-weight: 400;\"> known as Spectre and Meltdown.<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3247744\/microsoft-windows\/microsoft-reinstates-meltdownspectre-patches-for-some-amd-processors-but-which-ones.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[714,10761],"class_list":["post-11074","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-security","tag-windows-10"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11074","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11074"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11074\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11074"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11074"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11074"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}