There are 13 new August patches in the Microsoft Update Catalog, all dated August 20, all released in the past hour or two. They’re Intel microcode up
[See the full post at: Hangover Tuesday: Every version of Windows gets yet another Intel microcode patch]
![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Hangover Tuesday: Every version of Windows gets yet another Intel microcode patch
Home » Forums » Newsletter and Homepage topics » Hangover Tuesday: Every version of Windows gets yet another Intel microcode patch
- This topic has 80 replies, 23 voices, and was last updated 6 years, 6 months ago.
Tags: KB 4346084
AuthorTopicwoody
ManagerAugust 21, 2018 at 2:28 pm #212175Viewing 25 reply threadsAuthorReplies-
StoopidMonkey
AskWoody Plus -
anonymous
Guest -
EP
AskWoody_MVP
-
-
ViperJohn
AskWoody LoungerAugust 21, 2018 at 3:07 pm #212191You mean every version of Windows 10. While MicroSoft could easily put out Spectre MicroCode Updates for Windows 7 (and 8.1) Satya has decided to literally use the Organized Crime tactic of withholding protection to over 40% of it’s Windows Installed Base. He is outright trying to leverage (Extort might be more accurate) a lack of Spectre protection (again now caused by MicroSoft), in STILL IN SUPPORT Windows OS’s other than 10, to force users into Windows 10.
-
OscarCP
MemberAugust 21, 2018 at 3:36 pm #212194Just let’s wait and see. I am suspending judgement on MS about this, for now.
It looks like this might concern only those users with Windows 10 in their machines. If this is about Windows 10 only, this fact could have made clear by Woody. Perhaps this is the case here, perhaps it is not. But be that as it may, in dealing with the endless grief daily renewed from Windows 10 I’ve noticed that some people are increasingly referring to problems with Win 10 without clarifying that these are a concern only for those users running Win 10 in their PCs.
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV -
woody
Manager -
JohnW
AskWoody LoungerAugust 21, 2018 at 5:22 pm #212211Well in a nutshell, my understanding is that the preferred fix is to receive an OEM firmware update for your hardware. But in my case, as in many others, out of warranty hardware is not likely to ever see another OEM firmware update.
So the second line of defense is to issue a microcode update that the OS can load at boot time. This microcode is stored in volatile memory and needs to be restored at each OS boot. But it can patch flaws that exist in the underlying firmware or silicon.
These Microsoft patches are designed to supply that second line of defense for older hardware.
Windows 10 Pro 22H2
-
OscarCP
MemberAugust 21, 2018 at 6:06 pm #212219So, to give an example: I (really) have Windows 7, x64 and an I-7 “sandy bridge” CPU from around 2011.
Questions:
(1) Does anyone here have reason to disagree with JohnW’s #21221 assessment of the situation?
(2) Does anyone know if my PC’s CPU is too old to be still under warranty, and therefore might be eligible for this patch?
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV -
JohnW
AskWoody LoungerAugust 21, 2018 at 7:02 pm #212230Unfortunately, Microsoft is only releasing Intel microcode patches for the latest versions of Windows 10. Intel has been releasing microcode for older generation CPUs, but it is still up to Microsoft to release the patches and determine which OS gets supported.
Sandy Bridge (2011) is very likely to have been out of warranty for many years now, as is my Ivy Bridge (2012), which is a generation newer. So firmware updates are not going to happen with these.
Contact your computer manufacturer for warranty details, but anything that old is highly unlikely to still be covered. They would rather you buy new hardware.
Windows 10 Pro 22H2
4 users thanked author for this post.
-
Bill C.
AskWoody PlusAugust 22, 2018 at 12:26 am #212286I used to have a PDF from Intel of which Intel CPUs were scheduled for microcode. I had it bookmarked, but it keeps disappearing behind a log-in on the Intel site. Most older i series CPUs (most Gen1 and some Gen2) were not going to get firmware updates, unless it was a real popular CPU or Intel MB or was a Xeon type of CPU and even many of thiose were SOL. My i7-960 and the DX58SO2 MB will never get a firmware update from the OEM manufacturer (uh… Intel).
Steve Gibson’s Inspectre utility says an update is available for my CPUID, but checking the released firmware package does NOT include an UPDATE for my exact CPU. A contributor here, RDRGuy did a lot of work on the issue, but it was not for the amateur to attempt.
JohnW is dead on, even IF Intel released firmware for my ancient CPU, it would NEVER be used by MS for Win7. A friend who has an MSI motherboard has still received nothing from them and I cnould not find any BIOS/UEFI updates for his board of any Windows flavor. In my opinion, the OEMs share more blame than MS on lack of firmware updates.
-
EP
AskWoody_MVPAugust 22, 2018 at 11:37 am #212442not entirely true, JohnW.
read MS support KB article 4093836.
there are new Intel microcode updates for several versions of Windows 10, including the RTM (1507) release [for those using 1507 LTSB]. only version that is not getting them is the 1511 release which was already EOL.
-
JohnW
AskWoody Lounger
-
-
-
GoneToPlaid
AskWoody LoungerAugust 21, 2018 at 8:40 pm #212242These microcode updates can readily be implemented by Microsoft in Windows and Windows 8.1 at boot time, yet MS chooses not to do so. It is obvious that MS is leaving Win7 and Win8x users, and all users who are running older hardware which MS no longer supports in Windows 10, hanging out to dry.
-
OscarCP
MemberAugust 22, 2018 at 12:37 pm #212464As a point of general interest: If an update of the “software” microcode that happens to be installed at OS booting up time goes bad, does this also mean that one cannot boot up the OS at all? Not even in secure mode? If so, what then? Thanks.
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV -
anonymous
GuestAugust 23, 2018 at 9:41 am #212706If you’re running Linux, hold the shift key down during boot, go into Grub, and then select an older Kernel (then, after you boot up, delete the kernel that’s hosed, so you default to a working one). If that does not work, you can try this:
https://ubuntuforums.org/showthread/?t=2273643
Windows, I don’t know. I would try booting into Safe mode, and see if I could uninstall the offending update. I’d highly suggest doing a full system backup before adding Windows Microcode, though, as that may not work.
-
-
zero2dash
AskWoody LoungerAugust 22, 2018 at 10:47 am #212424To be fair, you don’t want these updates.
Smeltdown patches reduced performance in 7 & 8.1, which is why a lot of people either don’t install them or they disable the protection.There are no known exploits in the wild. This is key #2. You’re protecting yourself against something that has yet to exist.
Furthermore, the main attack vector that would be compromised (browsers) are updated (or are being updated) to help prevent Smeltdown as well.
This is just more of the same, really. I get your grievances, and follow along…but I’d rather not have the updates. If/when exploits are found or publicized, I would assume both browsers and A/V orgs will update their software to protect you accordingly anyway.
4 users thanked author for this post.
-
Microfix
AskWoody MVPAugust 22, 2018 at 10:57 am #212428@Zero2dash Luckily, these microcode updates don’t affect W7 and W8.1 but, I do understand exactly where you are coming from. 😉
If debian is good enough for NASA...
Wazhai
AskWoody Lounger-
woody
Manager -
mobartz
AskWoody Lounger -
JohnW
AskWoody LoungerAugust 22, 2018 at 9:17 am #212380It’s probably just Microsoft’s attempt at keeping the same patch code base installed on all Windows 10 machines. The microcode will most likely actually be installed only if the correct target processor is available at boot time.
There is always the possibility that you could swap your AMD motherboard out for an Intel, without doing a fresh install of Windows. Then you would need the new microcode at boot time. Windows 10 makes this a breeze to accomplish now, so it is a real thing.
Windows 10 Pro 22H2
-
EP
AskWoody_MVP
-
-
-
anonymous
Guestanonymous
GuestAugust 21, 2018 at 5:47 pm #212208No patches for Windows 7 and 8.1? Actually, I’m kind of relieved. Look on the bright side, folks–you won’t have further slowdowns and other issues with your computer (like we did earlier this year).
One thing is for certain: I’m buying AMD next time. Intel’s Meltdown, monopolistic ploys, profit-mining at the expense of innovation, and a host of other things really makes me want to stick it to Intel until they straighten up and fly straight. But I’m not holding my breath.
1 user thanked author for this post.
-
anonymous
Guest
Susan Bradley
Manageranonymous
GuestAugust 21, 2018 at 6:54 pm #212224-
JohnW
AskWoody LoungerAugust 21, 2018 at 7:18 pm #212236It’s probably best to wait on the patches, as Woody has said there are currently no exploits in the wild.
That being said, OEM firmware or BIOS updates may be best, but will only be provided for current hardware. If you have an older, end of life, out of warranty system, you will most likely never receive OEM updates for your hardware.
Windows 10 Pro 22H2
1 user thanked author for this post.
-
EP
AskWoody_MVPAugust 22, 2018 at 11:25 am #212439which seems to be happening with my family’s Dell Inspiron 620 computer, which uses Intel Sandy Bridge CPUs and Dell won’t be offering any microcode BIOS/firmware updates for it.
on the other hand, Dell DID offer BIOS updates for Inspiron 660/660s PCs, which uses Intel Ivy Bridge processors – see this list from the Dell support site.
-
JohnW
AskWoody LoungerAugust 21, 2018 at 7:10 pm #212231Questions: (1) Does anyone here have reason to disagree with JohnW’s #21221 assessment of the situation?
I did not provide footnotes to my assessment, but if you spend sufficient time with a search engine, you will reach the same conclusions. The facts are out there…
Windows 10 Pro 22H2
OscarCP
MemberAugust 21, 2018 at 7:11 pm #212232Well, it seems to me that, right this moment, no one, but absolutely no one here has the remotest idea of what all this might mean for any of us…
For my part, I have just now and most solemnly sworn an oath of blood NEVER to install a microcode patch in my beloved old Windows 7 PC! Be it meant to be applied to the firmware, the vaporware or the lycanthropic software.
So: Hey, Spectre! Hey Meltdown! Come and get me: see if I care!
Life is sweet, and it will go on… Until it doesn’t. So, there!
(And it even rhymes!)
Win 7 x64 SP1, I-7 “sandy bridge” – Group B for ever.
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AVNoel Carboni
AskWoody_MVPAugust 21, 2018 at 8:23 pm #212241Why is it that we never see any information whatsoever about what the performance impacts of these microcode updates, patches, etc. will be?
Back for Meltdown/Spectre, Microsoft DID publish some hints, of the form “you’ll probably notice a slowdown”. That’s not nearly good enough!
It’s unacceptable to foist things on people without letting them know the potential impacts. Don’t get used to this treatment.
-Noel
-
JohnW
AskWoody LoungerAugust 21, 2018 at 9:02 pm #212248I agree. So I ran an informal comparison with and without the mitigations in place, using Performance Test by Passmark Software. https://www.passmark.com/products/pt.htm
I found negligible difference on my system with and without the Spectre and Meltdown protection. Windows 10 Pro 1709 with an Ivy Bridge 3rd gen Intel Core i3 CPU.
Windows 10 Pro 22H2
3 users thanked author for this post.
-
Noel Carboni
AskWoody_MVP -
JohnW
AskWoody LoungerAugust 22, 2018 at 3:14 pm #212549Just to be clear, I was referring to the ORIGINAL mitigations for the Meltdown and Spectre vulnerabilities, not the latest variants. I am holding off on these new patches for now.
I ran Steve Gibson’s InSpectre tool, which allows you to disable/enable the protections.
Windows 10 Pro 22H2
1 user thanked author for this post.
-
Noel Carboni
AskWoody_MVP
-
-
-
anonymous
GuestAugust 22, 2018 at 6:12 am #212323Difficult and highly dependent on workload. See e.g. this VMWare document regarding L1TF:
https://kb.vmware.com/s/article/55767
Or this from MS:
The “core scheduler” mitigation might turn out to have rather disastrous performance affects depending on CPU over-commit/over-subscription.
2 users thanked author for this post.
Bill C.
AskWoody PlusAugust 22, 2018 at 10:00 am #212407Why is it that we never see any information whatsoever about what the performance impacts of these microcode updates, patches, etc. will be?
Back for Meltdown/Spectre, Microsoft DID publish some hints, of the form “you’ll probably notice a slowdown”. That’s not nearly good enough!
It’s unacceptable to foist things on people without letting them know the potential impacts. Don’t get used to this treatment.
-Noel
I suspect it is due to the many, many configurations out there. MS can hardly make patching work, so would you trust their testing?
For example my old Intel i7-960 on an Intel DX58SO2 MB took a minimal hit with the Meltdown software fixes. My Lenovo E440 laptop with an Intel i5 took a bigger hit (I guess less excess horsepower) but was not objectionable. However when the new firmware addressing Meltdown AND Spectre was released the laptop took a noticable hit, especially when installing updates. I have it turned off via Steve Gibson’s Inspectre utilty until it is reported in the wild.
What did surprise me is none of the tech sites did any methodical testing. I can find detailed reviews of GPUs that measure down to a few frames per second variations, but nothing on these fixes. I suspect the reason is they did not want to dissuade folks from installing the patches.
2 users thanked author for this post.
-
Noel Carboni
AskWoody_MVPAugust 22, 2018 at 1:45 pm #212471No doubt there is no way to make a statement like “You’ll experience xx.xxx% slower performance” because of the complexity of the computing world.
And it’s the kind of thing probably most folks won’t even notice or even care about. But some of us care very much because we’re doing computing out on the cutting edge.
The changes CAN be described, and the potential areas of impact COULD be identified.
What did surprise me is none of the tech sites did any methodical testing. I can find detailed reviews of GPUs that measure down to a few frames per second variations, but nothing on these fixes. I suspect the reason is they did not want to dissuade folks from installing the patches.
My own testing showed me quite clearly that much of the expenditure and time I’ve put into creating a highly-tuned I/O subsystem for my workstation (involving arrays of SSDs) will be simply lost if Meltdown/Specter mitigations are allowed in. Specifically, I found that the maximum I/O throughput my system can deliver went from 1800+ megabytes per second to 900 megabytes per second – LESS THAN HALF.
EVEN IF I take the updates and disable the mitigations by InSpectre there’s STILL an 8% hit to my I/O performance!
I measured this not only through artificial means, but by actually installing the updates and doing real world testing, doing things like software system builds.
What price security? I’m willing to pay some to reduce risk but not for made-up BS security, especially when I have many other things already in place that DON’T require me to wait longer for my work to be done and which are arguably far better than presuming malware is constantly running on my system pestering the OS for secret data.
-Noel
winoni71
AskWoody LoungerAugust 21, 2018 at 9:06 pm #212244Regarding Windows Updates on Windows 10:
I haven’t had the displeasure of using Windows 10 on my personal computer, so it’s not something that affects me on a personal level yet, but I have a question regarding the updates.
I’ve been reading since the birth of 10 that there is no way of taking full control of the updates, even if you stop the Windows Update service, it starts up by itself.
But on my office PC I see that the updates are not being installed and I have not received any notification about them.
In the screenshots attached, which are in italian, on the top of the 1st you can read “Some settings are handled by the organization” on the second you can read:
Disable automatic updates
Origin: Administrator
Type: Group criteria
How would one achieve such a thing?
Thank you.
-
OscarCP
MemberAugust 21, 2018 at 9:46 pm #212263Winoni71:” #212244 “:
” But on my office PC I see that the updates are not being installed and I have not received any notification about them. In the screenshots attached, which are in italian, on the top of the 1st you can read “Some settings are handled by the organization” on the second you can read: Disable automatic updates. Origin: Administrator. Type: Group criteria. ”
Just a thought: If you are working in Italy at the moment, could it be that MS has to work there complying with different rules and regulations imposed by the EU or the Italian authorities, than those they have to follow, for example, in the USA? In general the Europeans tend to have strong privacy and consumer protections. For example: the settings you see must be the default way MS needs to set up things to comply with those regulations.
But this is no more than a guess.
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV -
Susan Bradley
Manager
-
zero2dash
AskWoody LoungerAugust 22, 2018 at 3:22 pm #212551Most likely your organization is running either a WSUS server, or an SCCM server, to push the updates out on their own schedule.
Behind WSUS and SCCM, you can absolutely control Win10, because WSUS and SCCM have more weight than Automatic Updates. Even if you leave Automatic Updates enabled on the client workstations, they will only install what is provided to them by the WSUS or SCCM server. IOW, they will check for updates and find none, and thereby do nothing – unless a Domain Admin (or WSUS/SCCM Admin) makes the updates available to the clients.
The best thing (as a smart home user) to do, if you have 10 Pro, is change Automatic Updates to 2 in Group Policy, which notifies when updates are available but does nothing else. If you don’t download the updates, nothing happens. (If you do download the updates, they are automatically installed.) This is really the lone brick wall to stop Automatic Updates for 10 Pro that people who are not behind WSUS/SCCM have available to them.
-
JohnW
AskWoody LoungerAugust 22, 2018 at 3:39 pm #212553Instead of setting the Local Group Policy to 2, if you actually disable that policy you will stop the notifications as well. This has been working well for me! Nothing at all until I press the check for updates button! 🙂
Windows 10 Pro 22H2
1 user thanked author for this post.
-
zero2dash
AskWoody LoungerAugust 23, 2018 at 8:45 am #212693Yeah, that’s an option, but the problem there is you have to use wushowhide to see what the updates are before you hit the button to check and install, because otherwise it doesn’t show you. That’s why I like a setting of 2, because it shows the updates it wants to download but does nothing else (thereby removing the requirement of using wushowhide to see what the update(s) are). I guess it all boils down to personal preference there though, obviously. 🙂
1 user thanked author for this post.
-
JohnW
AskWoody Lounger
-
-
anonymous
Guest-
OscarCP
MemberAugust 21, 2018 at 11:25 pm #212283The Patch Lady posting #212221 was later, in the evening, around 6:16 PM:
“ The KB has changed so that now it indicates that it’s on the Microsoft catalog site only, not on Microsoft update. “
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV -
Susan Bradley
Manager -
Noel Carboni
AskWoody_MVP -
Susan Bradley
ManagerAugust 23, 2018 at 11:30 am #2127367’s aren’t getting any of the microcode updates. I’m trying to determine if 1803 10’s are getting this microcode update pushed to them or if you only get it if you check for updates?
Susan Bradley Patch Lady/Prudent patcher
1 user thanked author for this post.
-
Noel Carboni
AskWoody_MVPAugust 23, 2018 at 12:59 pm #212764OK, sorry, I didn’t quite get the context of the question.
Wow, so Win 10 updates received automatically might be a different set than when you press the [Check for Updates] button? Is that the “seekers” concept at work?
I’ve managed to get my own Win 10 Pro setup into a mode where it reports “Some settings are managed by your administrator” and it will only update if I run a .msu from the catalog. I really, really, really, really, really like it this way. I wish I could publish a “7 steps to accomplish that” guide, but I lost track of how I did it. Last thing I remember doing was poking around in gpedit.msc but now I don’t see settings in there that would imply I have changed something related to Windows Update from the defaults. Someone needs to write a tool that examines all the hundreds of different settings that could affect Windows Update and summarizes, like O&O ShutUp10 or similar. Sigh.
-Noel
-
-
-
PerthMike
AskWoody PlusAugust 22, 2018 at 12:28 am #212287anonymous
GuestAugust 22, 2018 at 12:36 am #212282I have an Ivy Bridge based HP Probook and I just did a firmware update last month so for Business laptops the support is a little longer than on the more consumer oriented laptop SKUs. It’s best to find out what laptop is most popular for the big enterprise customers and the laptop makers usually have a little better build quality for any make/models of Business laptops that are favored by the big enterprise customers.
I’d Like to replace my current Probook with an AMD Zen/Vega graphics based Radeon Pro mobile APU, and that Pro version gets a longer support and warranty period than the non Pro Raven Ridge(Zen/Vega graphics) consumer oriented Raven Ridge SKUs. Raven Ridge is the code name for AMD’s line of APUs that make use of the Zen cores and Vega integrated Graphics and hopefully the Raven Ridge Pro Variants will begin appearing in business laptops. There are also Raven Ridge Desktop APUs that hopefully will be appearing also with Pro Variants for those HP mini-desktop PC variants that are rather popular form factors for Business oriented usage.
I’d like to move away for Intel’s SKUs until they have all this Meltdown/Spectre mess fixed in their hardware. It’s risky flashing a laptops BIOS/UEFI as if the power goes out while you are flashing new firmware you can brick your laptop. I have some older Sandy Bridge generation laptops but I have not looked for any firmware updates from the Laptop’s OEMs as they are getting rather out of date, the oldest laptop that still works is a first generation core i series Intel Laptop and that’s probably never going to get any updates from Intel. Sandy Bridge may still get some Updating as Intel has been supporting some of its server class Sandy Bridge SKUs but laptop OEMs are not that much willing to support non business grade laptop much at all.
ViperJohn
AskWoody LoungerAugust 22, 2018 at 1:33 am #212290It’s not clear to me which pieces of the patches can be implemented in Windows, which have to be part of a firmware update, and which require both. Anybody else have a clue?
As you know Spectre mitigations require MicroCode updates. What many people are unaware of is these MicroCode updates can be applied in two ways. The first is via a firmware update, provided by your motherboard maker, to your motherboard. The second is via the MicroCode Update means (Mcupdate_GenuineIntel.dll or Mcupdate_GenuineAMD.dll) at boot that has been built into every version of Windows since at least Windows XP.
Note that either way the new MicroCode is applied, firmware or MS update, it’s the same code, supplied by either Intel or AMD. The difference is just in how and when in the boot cycle the MicroCode is introduced to the CPU.
-
EP
AskWoody_MVP -
JohnW
AskWoody Lounger -
GoneToPlaid
AskWoody Lounger -
Susan Bradley
Manager
-
-
Fred
AskWoody LoungerAugust 22, 2018 at 2:42 am #212298There are 13 new August patches in the Microsoft Update Catalog, all dated August 20, all released in the past hour or two. They’re Intel microcode up[See the full post at: Hangover Tuesday: Every version of Windows gets yet another Intel microcode patch]
Thanks Woody.
However there are no kwown breaches there STILL is a b****y NECESSITY to place all these patches. My HP-Pavilion needs very well the HP-patches for hard- and software. There simply is no clear descryption of these HP-patches, but the OS is simply performing more badly over the time and so on. Now up to yesterday it seems to go right again, BUT still, it’s all a TOMBOLA where believe in stabilily is still going down.
So, the Linux old-laptop, is still active and present for the real thing when things are going wrong again. It’s not a question of IF, but WHEN it goes down again.
Getting tired of it.
Regards and tulips, Fred* _ ... _ *_Reassigned Account
AskWoody Lounger-
Susan Bradley
Manager
woody
ManagerAugust 22, 2018 at 7:17 am #212337UPDATE: Crysta notes that there are two more microcode updates, both dated Aug 21, but they appear to be re-issues for last month’s microcode updates. KB 4090007 for Win10 1709 and KB 4100347 for 1803. jescott418 notes that KB 4100347 is arriving via Windows Update on his Win10 Home 1803 computer.
-
anonymous
GuestAugust 22, 2018 at 8:15 am #212351UPDATE: Crysta notes that there are two more microcode updates, both dated Aug 21, but they appear to be re-issues for last month’s microcode updates. KB 4090007 for Win10 1709 …..
Interesting since the MS information sheet on KB4346085 for ver 1709 says that it includes KB409007 – And still need KB4078407 (or manual registry entries) to enable it.
-
ch100
AskWoody_MVPAugust 22, 2018 at 2:29 pm #212516@woody I think what Crysta noticed is that the patches for 1803 which were downloaded before in WSUS but never installed, only detected if installed manually (this is not regular behavior) have now been reissued with metadata update and possible contents update to be installed automatically by WSUS if approved by administrator or Windows Update according to the documentation.
All the other microcode updates for Windows 10 other than for 1803 are new as far as I can tell. According to WSUS metadata, which can and has been wrong before, only the 1803 patches supersede previously released patches as they are cumulative for the microcode purpose according to other reports. -
anonymous
GuestAugust 23, 2018 at 12:37 pm #212755From Microsoft KB support on K4346085 for Windows 10 ver 1709:
Intel recently announced that they have completed their validations and started to release microcode for recent CPU platforms related to Spectre Variant 3a (CVE-2018-3640: “Rogue System Register Read (RSRE)”), Spectre Variant 4 (CVE-2018-3639: “Speculative Store Bypass (SSB)”), L1TF (CVE-2018-3615, CVE-2018-3620, CVE-2018-3646: “L1 Terminal Fault”). In addition to microcode updates previously released in </span>KB4090007 to address Spectre Variant 2 (CVE 2017-5715: “Branch Target Injection”), this update also includes microcode updates from Intel for the following CPUs.
And (note the below enablement KB was previously included with KB4090007)
Please make sure that mitigation against Spectre Variant 2 is enabled by applying the update through KB4078407 or through the registry settings that are documented in the following articles:
Edit to remove HTML – Please use the “Text” tab in the post entry box when you copy/paste
-
anonymous
GuestAugust 24, 2018 at 10:32 am #212934OK not I’m really confused.
Running Windows 10 Pro ver 1709 and just re-set my Monthy Quality Update delay back to 0 in order to allow the August updates to download then review (Update Group setting is 2)
In addition to the expected August KB’s came KB4090007 – Variant 2 microcode!
Per above, I thought this was contained (replaced by) the new KB4346085 and that these were manual catalog installs.
Anyone else receive these recently or earlier in the month if your system was not set to delay updates? Should I install, or hold, or manually install KB4346085?
-
-
winoni71
AskWoody LoungerAugust 22, 2018 at 7:31 am #212341Just a thought: If you are working in Italy at the moment, could it be that MS has to work there complying with different rules and regulations imposed by the EU or the Italian authorities
As far as I know there are no different rules and regulations regarding updates in Italy or the EU. Even though I don’t own a Windows 10 PC, I have used them from time to time, and I’ve never seen any option to disable updates.
Anytime you have any deferral settings in place that message “some settings are handled” is shown. You may have deferral settings that are holding them back.
Where would I find these “deferral settings”?
-
Susan Bradley
Manager
anonymous
GuestOscarCP
MemberAugust 22, 2018 at 10:41 am #212420So: nothing that might concern those of us with Windows 7 has shown up yet?
Or this is, still, all about Windows 10?
Thanks, in advance, for any useful update.
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV-
Microfix
AskWoody MVP -
EP
AskWoody_MVPAugust 22, 2018 at 11:32 am #212441that’s right OscarCP. nothing here for Win7 & Win8.1. MS doesn’t seem to “backport” these new microcode updates for Win10 to older Windows versions. also Win10 v1511 users won’t be getting the new microcode updates either since that version is completely out of support.
1 user thanked author for this post.
-
anonymous
Guestdyud76
AskWoody LoungerAugust 23, 2018 at 4:34 pm #212786Here is a problem report for the KB4100347 on Windows 10 1803.
After updating the DPC latency went through the roof while accessing USB flash through external (PCI-USB) card. The mouse is jerky, the sound freezes, etc.
System interrupts takes up to 20% CPU in Task Manager.
LatencyMon shows up to 500 ms DPC execution time for USBPORT.SYS
The MB USB ports are fine.
CPU: i5-2500K, Chipset: Z68Kinda have no hopes for this to be fixed, cause Microsoft would blame Intel and the opposite.
But does anyone have any ideas of a best place/places to get this reported?EDIT html to text (from copy>paste) – content may not appear as intended
anonymous
GuestGoneToPlaid
AskWoody LoungerAugust 25, 2018 at 11:01 am #213082As a point of general interest: If an update of the “software” microcode that happens to be installed at OS booting up time goes bad, does this also mean that one cannot boot up the OS at all? Not even in secure mode? If so, what then? Thanks.
If you have either a System Repair disk or the OEM or Retail Install disk, then you can boot from either and, using known methods, uninstall the offending update.
GoneToPlaid
AskWoody LoungerAugust 25, 2018 at 11:24 am #213084Hi everyone,
Yes, Microsoft can readily implement microcode updates into Win7 and Win8x. For example and for Win7, simply go to your Windows folder and search for “microcode” in Windows Explorer. The search results should show something similar to the following, depending on your CPU flavor and motherboard flavor:
amd64_microsoft-windows-microcodeupdate_31bf3856ad364e35_6.1.7600.16385_none_645de31f9d8e02a3.manifest
On my computer, the above file is dated 07/13/2009.
In other words, the above proves that Microsoft, since 2009, has had the capability of readily implementing CPU microcode updates within Windows 7. It is what it is.
5 users thanked author for this post.
-
walker
AskWoody LoungerAugust 25, 2018 at 2:53 pm #213107@GoneToPlaid: After reading all of these postings, I have a MAJOR headache, since I am totally computer illiterate. I will just have to wait until I can find a “safe” path to follow. Not having a lot of sophisticated programs does help, however the postings from you all help more than anything else. Thank you to everyone! 🙂
1 user thanked author for this post.
Viewing 25 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Microsoft Defender as Primary Security Question
by
blueboy714
1 hour, 5 minutes ago -
USB printers might print random text with the January 2025 preview update
by
Alex5723
17 minutes ago -
Hacktool:Win32/Winring0 (Awaiting moderation)
by
Marvel Wars
3 hours, 54 minutes ago -
Google’s 10-year-old Chromecast is busted, but a fix is coming
by
Alex5723
5 hours, 49 minutes ago -
Expand the taskbar?
by
CWBillow
5 hours, 39 minutes ago -
Gregory Forrest “Woody” Leonhard (1951-2025)
by
Susan Bradley
3 hours, 52 minutes ago -
March 2025 updates are out
by
Susan Bradley
1 hour, 10 minutes ago -
Windows 11 Insider Preview build 26120.3380 released to DEV and BETA
by
joep517
23 hours, 25 minutes ago -
Update Firefox to prevent add-ons issues from root certificate expiration
by
Alex5723
1 day, 6 hours ago -
Latest Firefox requires Password on start up
by
Gordski
1 day, 1 hour ago -
Resolved : AutoCAD 2022 might not open after updating to 24H2
by
Alex5723
1 day, 19 hours ago -
Missing api-ms-win-core-libraryloader-11-2-1.dll
by
IreneLinda
18 hours, 10 minutes ago -
How Much Daylight have YOU Saved?
by
Nibbled To Death By Ducks
21 hours, 8 minutes ago -
A brief history of Windows Settings
by
Simon Bisson
14 hours, 46 minutes ago -
Thunderbolt is not just for monitors
by
Ben Myers
13 hours, 22 minutes ago -
Password Generators — Your first line of defense
by
Deanna McElveen
18 hours, 49 minutes ago -
AskWoody at the computer museum
by
Will Fastie
14 hours, 25 minutes ago -
Planning for the unexpected
by
Susan Bradley
19 hours, 49 minutes ago -
Which printer type is the better one to buy?
by
Bob99
1 day, 21 hours ago -
Upgrading the web server
by
Susan Bradley
1 day, 19 hours ago -
New Windows 11 24H2 Setup – Initial Win Update prevention settings?
by
Tex265
2 days, 14 hours ago -
Creating a Google account
by
DavidofIN
2 days, 13 hours ago -
Undocumented “backdoor” found in Bluetooth chip used by a billion devices
by
Alex5723
2 days, 19 hours ago -
Microsoft Considering AI Models to Replace OpenAI’s in Copilot
by
Alex5723
3 days, 6 hours ago -
AI *emergent misalignment*
by
Alex5723
3 days, 8 hours ago -
Windows 11 Disk Encryption/ Bitlocker/ Recovery Key
by
Tex265
1 day, 16 hours ago -
Trouble signing out and restarting
by
Tech Hiker
15 hours, 13 minutes ago -
Windows 7 MSE Manual Updating
by
Microfix
12 hours ago -
Problem running LMC 22 flash drive
by
Charlie
2 days, 15 hours ago -
Outlook Email Problem
by
Lil88reb
2 days, 15 hours ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.