Windows Meltdown-Spectre patches: If you haven't got them, blame your antivirus

Windows Meltdown-Spectre patches: If you haven't got them, blame your antivirus

Top comments in the forum state that the best fix for those experiencing the problem is to clean install Windows 10 and then disable or pause Windows Updates to prevent KB4056892 from being installed. The update was delivered though Windows Update. This appears to be an issue following the application of Security Update KB4056892, Microsoft's Patch for Meltdown and Spectre.

Unless the antivirus vendor has set a Windows registry key that provides compatibility with the update, users of the affected Windows platform will not be protected by the security updates.

"After several failed boots [it does] a rollback and [then] it shows error 0x800f0845". We'll update this post with more information if and when it's available.

It's not clear how widespread this issue is, but the reporter noted that the CPU involved is "quite pre-historic", specifically the AMD Athlon X2 6000+, which was released a decade ago. "Google Cloud is architected in a manner that enables us to update the environment while providing operational continuity for our customers", wrote Google executives in a January 5 blog post. The "frustrated" user, for example, reports that beyond that laptop, one desktop with a different AMD chip and three laptops with Intel chips have successfully updated. The company stresses, however, to wait for the appropriate firmware updates specifically related to Meltdown and Spectre, so as not to download older versions.

Microsoft also revealed a series of UEFI updates for its Surface products, which are basically coming from Intel since the Surface devices use Intel processors. Security experts say all organizations should put mitigations in place as soon as possible, preferably starting with browsers, since attackers could use malicious websites to try and exploit the flaws.

Vendors including Bitdefender, McAfee, and Trend Micro say they're still testing Microsoft's security update, though some versions of their software are ready. Based on the analysis to date, many types of computing devices - with many different vendors' processors and operating systems - are susceptible to these exploits.

The faulty design has been present in chips for years and it will force a redesign of the Linux and Windows kernels.

Related:

Comments

Other news