KB4078130 Update to Disable Mitigation against Spectre, Variant 2

Page 1 of 5 123 ... LastLast
    KB4078130 Update to Disable Mitigation against Spectre, Variant 2

    KB4078130 Update to Disable Mitigation against Spectre, Variant 2


    Last Updated: 12 Apr 2018 at 14:48

    Critical Update to Disable Mitigation against Spectre, Variant 2

    Applies to: Windows 7 Service Pack 1, Windows 8.1, Windows 10, Windows 10 Version 1511, Windows 10 Version 1607, Windows 10 Version 1703, Windows 10 version 1709, Windows Server 2008 R2 Standard, Windows Server 2012 R2 Standard



    Summary

    Intel has reported issues with recently released microcode meant to address Spectre variant 2 (CVE 2017-5715 Branch Target Injection) – specifically Intel noted that this microcode can cause “higher than expected reboots and other unpredictable system behavior” and then noted that situations like this may result in “data loss or corruption.” Our own experience is that system instability can in some circumstances cause data loss or corruption. On January 22nd Intel recommended that customers stop deploying the current microcode version on impacted processors while they perform additional testing on the updated solution. We understand that Intel is continuing to investigate the potential impact of the current microcode version and encourage customers to review their guidance on an ongoing basis to inform their decisions.

    While Intel tests, updates and deploys new microcode, we are making available an out of band update today, KB4078130, that specifically disables only the mitigation against CVE-2017-5715 – “Branch target injection vulnerability.” In our testing this update has been found to prevent the behavior described. For the full list of devices, see Intel’s microcode revision guidance. This update covers Windows 7 (SP1), Windows 8.1, and all versions of Windows 10, for client and server. If you are running an impacted device, this update can be applied by downloading it from the Microsoft Update Catalog website. Application of this payload specifically disables only the mitigation against CVE-2017-5715 – “Branch target injection vulnerability.”

    Note Users who do not have the affected Intel microcode do not have to download this update.

    We are also offering a new option – available for advanced users on impacted devices – to manually disable and enable the mitigation against Spectre Variant 2 (CVE 2017-5715) independently via registry setting changes. The instructions for the registry key settings can be found in the following two Knowledge Base articles:


    As of January 25, there are no known reports to indicate that this Spectre variant 2 (CVE 2017-5715 ) has been used to attack customers. We recommend Windows customers, when appropriate, reenable the mitigation against CVE-2017-5715 when Intel reports that this unpredictable system behavior has been resolved for your device.

    How to get this update

    Microsoft Update Catalog

    To get the stand-alone package for this update, go to the Microsoft Update Catalog website.

    More Information


    Known issues in this update

    Microsoft is not aware of any issues that affect this update currently.

    Prerequisites

    There are no prerequisites to apply this update.

    Registry information

    To apply this update, you don't have to make any changes to the registry.

    Restart requirement

    You will have to restart the computer after you apply this update.

    Update replacement information

    This update does not replace a previously released update.


    Source: https://support.microsoft.com/en-us/...ctre-variant-2


    Direct download link for KB4078130 EXE file from Microsoft Update Catalog:

    Download KB4078130 MSU for Windows 10, Windows 10 LTSB, Windows 7, Windows 8.1, Windows Embedded Standard 7, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012 R2, Windows Server 2016 - 24 KB
    Brink's Avatar Posted By: Brink
    29 Jan 2018


  1. Posts : 27,181
    Win11 Pro, Win10 Pro N, Win10 Home, Windows 8.1 Pro, Ubuntu
       #1

    Shawn, if I have not had any problems since activating the mitigation, I can/should just leave well enough alone, and count myself lucky? Or should I go get this one?

    I mean, if they are not sending it through Windows update, most non-geeks won't even know about this, so my takeaway is no need to get it...
      My Computers


  2. Posts : 68,888
    64-bit Windows 11 Pro for Workstations
    Thread Starter
       #2

    Hey Cliff, :)

    Correct. This update is for those that have been impacted by the “higher than expected reboots and other unpredictable system behavior”.

    If you're not having any issues, then you could skip this update if wanted.
      My Computers


  3. Posts : 7,724
    3-Win-7Prox64 3-Win10Prox64 3-LinuxMint20.2
       #3

    Hi,
    Wouldn't this be useless on win-10 seeing these are security updates and can't be disabled from reloading ?
      My Computers


  4. Posts : 27,181
    Win11 Pro, Win10 Pro N, Win10 Home, Windows 8.1 Pro, Ubuntu
       #4

    Brink said:
    Hey Cliff, :)

    Correct. This update is for those that have been impacted by the “higher than expected reboots and other unpredictable system behavior”.

    If you're not having any issues, then you could skip this update if wanted.
    Thanks for the info Shawn:)
      My Computers


  5. Posts : 4,793
    Windows 10 preview 64-bit Home
       #5

    I tried to install it earlier on , on a Intel Core i5 6300HQ (Skylake) system, but refuses to do so.
      My Computers


  6. Posts : 2,297
    Windows 10 Pro (64 bit)
       #6

    If your system seems ok it’s probably not worth trying to force it. Just wait for windows update to push the next one. I’m thinking of dusting off my Commodore 64 and going back to using that as my computer. A simpler time with no updates and no bios modifications and no threats!
      My Computer


  7. Posts : 2,557
    Windows 10 pro x64-bit
       #7

    Fabler2 said:
    I tried to install it earlier on , on a Intel Core i5 6300HQ (Skylake) system, but refuses to do so.
    Maybe it's because you didn't install the MCU from Intel in the first place. Understand that this KB is only for users who did and are having "higher than expected reboots and other unpredictable system behavior". Like in my case, I don't have to install this update to disable mitigation for anything, since so far I haven't got any microcode update from Intel. :)
      My Computers


  8. Posts : 2,832
    Windows 10 Pro X64
       #8

    Hi,

    ThrashZone said:
    Hi,
    Wouldn't this be useless on win-10 seeing these are security updates and can't be disabled from reloading ?
    Not sure what you mean but see @IronZorg89 's posting just above this one.


    Cheers,
      My Computers


  9. Posts : 30,178
    Windows 11 Pro x64 Version 23H2
       #9

    I down loaded, right clicked, Run as Administrator, ask if I want to make changes and then I don't see anything.

    It is not listed as installed. I guess if it is just making quick registry change it would be fast.

    Any easy way to check?
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 11:25.
Find Us




Windows 10 Forums