![]() ![]() ![]() ![]() \"Microsoft is working with AMD to resolve this issue and resume Windows OS security updates to the affected AMD devices via Windows Update and WSUS as soon as possible.\"\n\nIn short, if you're running Windows on a computer powered by an AMD, you're not going to be offered the Spectre/Meltdown fixes for now. Microsoft warned that the BSOD problems were attributable to many antivirus programs not yet updating their software to play nice with the security updates.\n\nOn Tuesday, Microsoft said it was suspending the patches for computers running AMD chipsets.\n\n\"After investigating, Microsoft determined that some AMD chipsets do not conform to the documentation previously provided to Microsoft to develop the Windows operating system mitigations to protect against the chipset vulnerabilities known as Spectre and Meltdown,\" the company said in ().\n\n\"To prevent AMD customers from getting into an unbootable state, Microsoft has temporarily paused sending the following Windows operating system updates to devices that have impacted AMD processors,\" the company continued. The bugs are thought to be mainly exploitable in chips made by **Intel** and **ARM**, but researchers said it was possible they also could be leveraged to steal data from computers with chips made by **AMD**.\n\nBy the time that story had published, Microsoft had already begun shipping an emergency update to address the flaws, but many readers complained that their PCs experienced the dreaded \"()\" (BSOD) after applying the update. Separately, **Adobe** pushed a security update to its **Flash Player** software.\n\n!()Last week's story, (), sought to explain the gravity of these two security flaws present in most modern computers, smartphones, tablets and mobile devices. 2018 Patch Tuesday Lowdown", "enchantments_done":, "cvelist":, "references":, "description": "**Microsoft** on Tuesday released 14 security updates, including fixes for the **Spectre** and **Meltdown** flaws detailed last week, as well as a zero-day vulnerability in **Microsoft Office** that is being exploited in the wild. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |