AMD Ryzen 5 5600 review
PowerColor RX 6650 XT Hellhound White review
FSP Hydro PTM Pro (1200W PSU) review
ASUS ROG Radeon RX 6750 XT STRIX review
AMD FidelityFX Super Resolution 2.0 - preview
Sapphire Radeon RX 6650 XT Nitro+ review
Sapphire Radeon RX 6950 XT Sapphire Nitro+ Pure review
Sapphire Radeon RX 6750 XT Nitro+ review
MSI Radeon RX 6950 XT Gaming X TRIO review
MSI Radeon RX 6750 XT Gaming X TRIO review
AMD: brief statement on Spectre/Windows Update issue
Earlier today we already posted news that some AMD platforms have issues with the new Microsoft Spectre and Meltdown patches. Some end-users ended up into systems not booting after Microsoft applied the patch.
AMD just send out a small statement on that, I'll just post that as -is:
-- AMD --
AMD is aware of an issue with some older generation processors following installation of a Microsoft security update that was published over the weekend. AMD and Microsoft have been working on an update to resolve the issue and expect it to begin rolling out again for these impacted shortly. Also, we wanted to make it clear this patch is to address GPZ Variant 1 (one of the variants of Spectre) and not GPZ Variant 3 (Meltdown).
« GALAX Releases GeForce GTX 1070 Ti Hall of Fame edition 8GB · AMD: brief statement on Spectre/Windows Update issue
· SteelSeries Announces Rival 600 Gaming Mouse »
WareTernal
Senior Member
Posts: 255
Joined: 2013-09-27
Senior Member
Posts: 255
Joined: 2013-09-27
#5509400 Posted on: 01/10/2018 08:24 PM
Thanks Captain Obvious!
non-booting refers to OS not PC
Thanks Captain Obvious!

Dazz
Senior Member
Posts: 973
Joined: 2001-08-12
Senior Member
Posts: 973
Joined: 2001-08-12
#5509462 Posted on: 01/11/2018 12:29 AM
Well done Micro$haft rushing a patch out before testing and rather than excluding specific identifications like "AuthenticAMD" CPUID you just install it on anything and everything, whats next Windows update going to install AMD drivers onto my nVidia graphics card? It's not the first time Micro$oft have had to pull patches due to being rushed and braking stuff... and it won't be the last either.
Well done Micro$haft rushing a patch out before testing and rather than excluding specific identifications like "AuthenticAMD" CPUID you just install it on anything and everything, whats next Windows update going to install AMD drivers onto my nVidia graphics card? It's not the first time Micro$oft have had to pull patches due to being rushed and braking stuff... and it won't be the last either.
sykozis
Senior Member
Posts: 22075
Joined: 2008-07-14
Senior Member
Posts: 22075
Joined: 2008-07-14
#5509483 Posted on: 01/11/2018 01:59 AM
Existing is not the same as being known. Prior to June 2017, apparently nobody was aware of the existance of these vulnerabilities, unlike the Intel ME vulnerability that has been known for several years now or the AMD PSP/fTPM vulnerability that was "discovered" just a few months ago. (I put quotes there because that particular vulnerability was based on fTPM emulation and not actual hardware access, even though it's been known that fTPM is less secure than a hardware TPM.)
I've stopped caring about all of this. No one is really going to lose performance and the media is really trying to make this into more than it really is.It's really not a big deal for the home user. This exploit has been around for 10 years. Just install the patches and move on. Nothing more to be seen here.
Existing is not the same as being known. Prior to June 2017, apparently nobody was aware of the existance of these vulnerabilities, unlike the Intel ME vulnerability that has been known for several years now or the AMD PSP/fTPM vulnerability that was "discovered" just a few months ago. (I put quotes there because that particular vulnerability was based on fTPM emulation and not actual hardware access, even though it's been known that fTPM is less secure than a hardware TPM.)
tensai28
Senior Member
Posts: 1456
Joined: 2013-10-31
Senior Member
Posts: 1456
Joined: 2013-10-31
#5509525 Posted on: 01/11/2018 05:26 AM
I'm fully aware of this. That is why the patch is being to released. Regardless people made a big deal about it and the media led people to believe they would lose 30% performance from the patches. In reality only servers and people running VMs are effected and there is no reason for regular users (that includes us more advanced users here on guru3d even) to care about this at all. Even those servers may see up to 30% performance loss. Lot's of news articles stated it like this. (Key words are in bold) That doesn't mean they will even be dropping that much at all, just maybe in certain situations. They only word it that way so that people will show interest and click their links and read their stories. Let's all relax about this and just install the patches and move on. Our PC's will perform exactly as they did before and after the patch.
The media loves to do this kind of stuff all the time unfortunately. This is how they grab peoples attention and get people to read. They aren't necessarily lying, just painting a picture in your head that isn't necessarily there. They would take the worst case scenario of something and use words like would, could, possibly, up to, may or if to lead you to believe it's a lot worse than it really is. In reality it's really not nearly as bad. If they had just told it like it is and said that only businesses and servers would be effected and only during certain operations, I'm pretty sure most people wouldn't care nor read into it as much. Everyone should do their own research before jumping to conclusions.
Existing is not the same as being known. Prior to June 2017, apparently nobody was aware of the existance of these vulnerabilities, unlike the Intel ME vulnerability that has been known for several years now or the AMD PSP/fTPM vulnerability that was "discovered" just a few months ago. (I put quotes there because that particular vulnerability was based on fTPM emulation and not actual hardware access, even though it's been known that fTPM is less secure than a hardware TPM.)
I'm fully aware of this. That is why the patch is being to released. Regardless people made a big deal about it and the media led people to believe they would lose 30% performance from the patches. In reality only servers and people running VMs are effected and there is no reason for regular users (that includes us more advanced users here on guru3d even) to care about this at all. Even those servers may see up to 30% performance loss. Lot's of news articles stated it like this. (Key words are in bold) That doesn't mean they will even be dropping that much at all, just maybe in certain situations. They only word it that way so that people will show interest and click their links and read their stories. Let's all relax about this and just install the patches and move on. Our PC's will perform exactly as they did before and after the patch.
The media loves to do this kind of stuff all the time unfortunately. This is how they grab peoples attention and get people to read. They aren't necessarily lying, just painting a picture in your head that isn't necessarily there. They would take the worst case scenario of something and use words like would, could, possibly, up to, may or if to lead you to believe it's a lot worse than it really is. In reality it's really not nearly as bad. If they had just told it like it is and said that only businesses and servers would be effected and only during certain operations, I'm pretty sure most people wouldn't care nor read into it as much. Everyone should do their own research before jumping to conclusions.
Click here to post a comment for this news story on the message forum.
Senior Member
Posts: 2481
Joined: 2014-01-21
Fx is not bad but It is getting long in the tooth, as they say, I need to upgrade like really soon I have that Mod-bug starting-up again. Very satisfying putting together your own machine then the first time you fire it up, It's alive! Just for the fun of it.