{"id":11127,"date":"2018-01-16T08:30:02","date_gmt":"2018-01-16T16:30:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/01\/16\/news-4898\/"},"modified":"2018-01-16T08:30:02","modified_gmt":"2018-01-16T16:30:02","slug":"news-4898","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/01\/16\/news-4898\/","title":{"rendered":"Microsoft&#039;s mystifying Meltdown\/Spectre patches for AMD processors"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security14-100734743-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Tue, 16 Jan 2018 07:33:00 -0800<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">I\u2019ve seen a lot of bizarre Microsoft patches-of-patches, but the new patches for AMD processors are in a world of their own. The security-only, manually downloadable patches appear to be Meltdown\/Spectre patches for machines that were bricked by other bad patches, earlier this month, but they\u2019ve arrived with no instructions \u2014 and a strange circular logic.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Last week, Microsoft released two patches, with these official titles:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Win7 KB article says:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">An update is available to fix the following issue that occurs after you install <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4056897\" rel=\"nofollow\"><span style=\"font-weight: 400;\">January 3, 2018\u2014KB4056897 (Security-only update)<\/span><\/a><span style=\"font-weight: 400;\"> or <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4056894\" rel=\"nofollow\"><span style=\"font-weight: 400;\">January 4, 2018\u2014KB4056894 (Monthly Rollup)<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">AMD devices fall into an unbootable state\u2026<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This update does not replace a previously released update.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Win8.1 article says the same thing, with reference to the analogous patches <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4056898\" rel=\"nofollow\"><span style=\"font-weight: 400;\">KB 4056898<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4056895\" rel=\"nofollow\"><span style=\"font-weight: 400;\">4056895<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2026 and that\u2019s all of the description on offer. You can find lots of posts about the two patches and how they fix the \u201cunbootable state\u201d (what most of us would call a BSOD or blue screen), but there\u2019s exactly zero advice on how to use the patches, or what fixes they include. And that part about \u201cdoes not replace a previously released update\u201d has my head whirling.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Just for starters, if you installed one of this month\u2019s buggy Meltdown\/Spectre Windows patches on a machine with an older AMD processor (Athlon, Sempron, Turion, Opteron, Phenom and some Ryzen computers), you probably <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3246633\/microsoft-windows\/a-mess-of-microsoft-patches-warnings-about-slowdowns-and-antivirus-proves-crucial.html\"><span style=\"font-weight: 400;\">hit a blue screen<\/span><\/a><span style=\"font-weight: 400;\">. Microsoft <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3246188\/microsoft-windows\/microsoft-yanks-buggy-windows-meltdown-spectre-patches-for-amd-computers.html\"><span style=\"font-weight: 400;\">pulled the patches<\/span><\/a><span style=\"font-weight: 400;\">\u00a0a few days later, but a whole lot of people had to boot to a recovery environment or re-install Windows, just to get going again.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Now we have patches for Win7 and 8.1 that appear to be the Meltdown\/Spectre patches specifically for AMD machines. There\u2019s something karmic about a patch that is designed to install on a machine that can\u2019t boot, thus can\u2019t install any patches. But let&#8217;s move beyond the Kafkaesque dilemma.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are just a few of the many, many questions swirling around over the weekend:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Which AMD machines are targeted? I don\u2019t know. Microsoft isn\u2019t saying. Apparently these patches are meant for machines that threw BSODs with the earlier patches \u2014 but do you need to install the original patch and wait to see if you hit a BSOD, before installing these patches?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If installing a patch just to see if it bricks your machine doesn\u2019t sound like a fun way to spend a snowy day, can you put these new patches on any AMD machine? If so, what happens? Who knows? <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Are these patches replacements for the originals \u2014 do they cover the same ground \u2014 or are they somehow different? Poster <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/january-patch-tuesday-overview\/#post-158971\" rel=\"nofollow\"><span style=\"font-weight: 400;\">@MrBrian on AskWoody<\/span><\/a><span style=\"font-weight: 400;\"> says:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On Windows 7 x64, I compared what KB4056897 installs vs. what KB4073578 installs. Considering just executable files, KB4073578 installs a newer version of some executable files. \u2026 Of the changed executable files between the two Windows 7 x64 updates (inspected with CBS Package Inspector), the only executable file that changed in size is hvax64.exe.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So if the old and new versions of this month\u2019s Windows\/Spectre patches install different files, should you install the new patch on an AMD machine that somehow installed the old one? <\/span><\/p>\n<p><span style=\"font-weight: 400;\">For that matter, can you install this newer version on an Intel machine and get away with it? @MrBrian in an intrepid moment tried that. <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/january-patch-tuesday-overview\/#post-159559\" rel=\"nofollow\"><span style=\"font-weight: 400;\">His conclusion<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As a test, I installed<\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073578\/unbootable-state-for-amd-devices-in-windows-7-sp1-windows-server-2008\" rel=\"nofollow\"> <span style=\"font-weight: 400;\">KB4073578<\/span><\/a><span style=\"font-weight: 400;\"> on two computers with two different Intel CPU models. I then rebooted and logged into a user account on each computer. There were no apparent problems. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">To recap, we have patches for Win7 and 8.1 AMD computers that officially only apply to bricked AMD computers, but still install on Intel computers, and come up with a newer hvax64.exe file. And the patches are only for Win7 and 8.1, not Win10.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Care to chase this down the January patch rabbit hole? <\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example, as @PKCano notes, the Win8.1 Monthly Rollup appeared after the Win7 Monthly Rollup. Does the Win8.1 Monthly Rollup include the new security files or the old ones? <\/span><\/p>\n<p><span style=\"font-weight: 400;\">What happens if you install the old patches and the new patches, in any time sequence combination of Security-only, Monthly Rollup, old and new? <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let\u2019s not forget that Microsoft started <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3247744\/microsoft-windows\/microsoft-reinstates-meltdownspectre-patches-for-some-amd-processors-but-which-ones.html\"><span style=\"font-weight: 400;\">pushing the Meltdown\/Spectre patches <\/span><\/a><span style=\"font-weight: 400;\">for some AMD processors, but are they old ones or new ones, and for which processors?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Most of all, what happened to Windows 10? Microsoft <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3246188\/microsoft-windows\/microsoft-yanks-buggy-windows-meltdown-spectre-patches-for-amd-computers.html\"><span style=\"font-weight: 400;\">yanked a half-dozen<\/span><\/a><span style=\"font-weight: 400;\"> January Win10 cumulative updates because they were bricking AMD processors. At least some of those cumulative updates are going out again. Do they include the new files or the old ones? Since Microsoft doesn\u2019t release Security-only patches for Win10, are we stuck with the old cumulative updates until the February Patch Tuesday cycle kicks in? What about those who have AMD machines that choke on the cumulative updates?<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">I feel an Excedrin headache coming on. Join me on the <\/span><\/i><a href=\"https:\/\/www.askwoody.com\/2018\/could-somebody-please-explain-the-new-win7-and-8-1-meltdown-spectre-unbootable-amd-patches-to-me\/\" rel=\"nofollow\"><i><span style=\"font-weight: 400;\">AskWoody Lounge<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">.<\/span><\/i><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3247676\/microsoft-windows\/microsofts-mystifying-meltdownspectre-patches-for-amd-processors.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security14-100734743-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Tue, 16 Jan 2018 07:33:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">I\u2019ve seen a lot of bizarre Microsoft patches-of-patches, but the new patches for AMD processors are in a world of their own. The security-only, manually downloadable patches appear to be Meltdown\/Spectre patches for machines that were bricked by other bad patches, earlier this month, but they\u2019ve arrived with no instructions \u2014 and a strange circular logic.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Last week, Microsoft released two patches, with these official titles:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073578\/unbootable-state-for-amd-devices-in-windows-7-sp1-windows-server-2008\" rel=\"nofollow\"><span style=\"font-weight: 400;\">KB 4073578<\/span><\/a><span style=\"font-weight: 400;\">: Unbootable state for AMD devices in Windows 7 SP1 and Windows Server 2008 R2 SP1<\/span><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073576\/unbootable-state-for-amd-devices-windows-8-1-windows-server-2012-r2\" rel=\"nofollow\"><span style=\"font-weight: 400;\">KB 4073576<\/span><\/a><span style=\"font-weight: 400;\">: Unbootable state for AMD devices in Windows 8.1 and Windows Server 2012 R2<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The Win7 KB article says:<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3247676\/microsoft-windows\/microsofts-mystifying-meltdownspectre-patches-for-amd-processors.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[714,10761],"class_list":["post-11127","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-security","tag-windows-10"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11127"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11127\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11127"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}