First reported on answers.microsoft.com, users have shared a bunch of cases in which Security Update for Windows KB4056892, Redmond's Meltdown/Spectre patch, leaves some AMD PCs with the Windows 7 or 10 startup logo and not much more.
In its blog post, the software giant said the patches had caused computer screens to freeze up, or have so-called "blue screen errors" on Windows 10, Windows 8.1 and Windows 7. This is why you want to be careful to evaluate the risk of untrusted code for each Windows Server instance, and balance the security versus performance tradeoff for your environment.
For Windows Server, administrators should ensure they have mitigations in place at the physical server level to ensure they can isolate virtualized workloads running on the server.
We now support 45 editions of Windows. SharedArrayBuffer may return after the company is confident that it can't be used to stage an attack, according to Microsoft Principal Lead Program Manager John Hazen.
Alas, it's the variant 2 fix that entails the greatest performance hit on systems. The Meltdown and Spectre patches add security checks in-between those transitions, which explains why the performance degradation is larger on these operating systems.
Silicon microcode is distributed by the silicon vendor to the system OEM, which then decides to release it to customers. That's why i'd be updating all my systems if I was responsible for system security. The company also expects that most users will be able to notice that performance degradation. Surface will be updated through Windows Update starting today.
Last week the stock rose almost 20 percent as investors speculated AMD could wrest market share from Intel, whose chips are exposed to risks from possible Meltdown and Spectre attacks. We expect the remaining editions to be patched soon.
In early December we began distributing Intel firmware updates to our OEM partners. However, he emphasized that businesses running transactional processing systems or time-sensitive applications need to conduct testing before they apply any OS security updates. So far, active attacks haven't been detected, but the problem has been present in chips for decades. Unfortunately, researchers found ways to surface that information.