Several AMD processor series – Athlon, Sempron, Opteron and Turion — seem most at risk, but others are reporting problems. Can somebody explain the d
[See the full post at: Widespread reports of blue screens (0X000000C4 and 0x800f0845) with Meltdown/Spectre patches for Win7 (KB 4056894) and Win10 1709 (KB 4056894)]
![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Widespread reports of blue screens (0X000000C4 and 0x800f0845) with Meltdown/Spectre patches for Win7 (KB 4056894) and Win10 1709 (KB 4056892)
Home » Forums » Newsletter and Homepage topics » Widespread reports of blue screens (0X000000C4 and 0x800f0845) with Meltdown/Spectre patches for Win7 (KB 4056894) and Win10 1709 (KB 4056892)
- This topic has 62 replies, 19 voices, and was last updated 7 years, 2 months ago by
anonymous.
AuthorTopicwoody
ManagerJanuary 8, 2018 at 6:14 am #157343Viewing 29 reply threadsAuthorReplies-
abbodi86
AskWoody_MVP -
alpha128
AskWoody Plus -
_Reassigned Account
AskWoody Lounger -
anonymous
GuestJanuary 8, 2018 at 8:55 am #157368The stampede is underway – lawyers and investors are clamoring to gulp down what’s on offer at the glutton’s trough au jour d’aujourd’hui Today’s specialty is Intel and AMD ta tare.
The meltdown vulnerability patch from Microsoft managed to melt down several AMD Athlon systems. Intel manged to stuff both feet in their mouth while madly making slashing attempts at AMD. The stocks for both AMD and Intel are up and down like an amusement park ride and lawyers are savaging and scavenging at will.
Spectre will be the final banquet. All you can eat.
What a gong show.
2 users thanked author for this post.
-
MrToad28
AskWoody LoungerJanuary 8, 2018 at 8:55 am #157371Given that there are no reported exploits in the wild, the patches will likely slow the PC’s and reasonable good practice will protect cautious users since malware must be delivered to the PC for this vulnerability to be exploited…there is no good reason to patch until they get it fixed.
The worse threat to PC health continues to be bad patches and bad patching practices…beta testing for Microsoft..pioneers wear arrow shirts.
9 users thanked author for this post.
-
MrBrian
AskWoody_MVP -
lurks about
AskWoody LoungerJanuary 8, 2018 at 4:50 pm #157509OS vendors are not an enviable position. The problem is not of their making but they can mitigate against some of its worst aspects. The balancing act they face is to get reliable patches out last month before they get dragged into the muck. Since MS does not properly test patches anyway, these patches will be more problematic as they are affecting large swaths of Windows. A proper QA group with a little less haste would probably less the carnage.
2 users thanked author for this post.
-
CraigS26
AskWoody PlusJanuary 8, 2018 at 9:27 am #157377https://www.ghacks.net/2018/01/08/fix-windows-7-bsod-0x000000c4-after-installing-kb4056894/
Above is for Removing KB4056894 IF you got BSOD and can’t access W7 .
W10 Pro 22H2 / Hm-Stdnt Ofce '16 C2R / Macrium Pd vX / GP=2 + FtrU=Semi-Annual + Feature Defer = 1 + QU = 0
MrJimPhelps
AskWoody MVP-
MrBrian
AskWoody_MVPJanuary 8, 2018 at 10:35 am #157392See attack scenarios at https://github.com/marcan/speculation-bugs.
3 users thanked author for this post.
-
anonymous
Guest -
anonymous
Guest -
MrBrian
AskWoody_MVP -
anonymous
GuestJanuary 9, 2018 at 3:24 pm #157892After trying the linked proof of concept, I was able to see the message after changing the timing from its default. However, it isn’t certain if this is confirmation of vulnerability, if it is real then AMD needs to be more forth coming about all of their classes of CPUs.
What a mess…
1 user thanked author for this post.
-
-
-
anonymous
Guest-
PKCano
ManagerJanuary 8, 2018 at 10:48 am #157397 -
EP
AskWoody_MVPJanuary 8, 2018 at 12:26 pm #157421the KB4056895 rollup for Win8.1 is still not yet available until most likely tomorrow January 9
my father’s Toshiba touchscreen based Satellite C55dt laptop with Win8.1 uses an AMD A6-5200 Kabini APU (an integrated CPU/GPU kind) and will definitely not rush to apply the January 2018 rollups. MS should seriously fix their buggy patches first.
1 user thanked author for this post.
-
Geo
AskWoody Plus-
Geo
AskWoody Plus
abbodi86
AskWoody_MVP-
EP
AskWoody_MVP -
anonymous
Guest -
abbodi86
AskWoody_MVP -
woody
Manager -
anonymous
GuestJanuary 9, 2018 at 4:55 am #157644I think so. On my AMD Athlon x64 the update (win7 32bit) is not longer available via windows update (it was half an hour ago). As i see they pulled it off for AMD FX too (win7 64bit).
They had to read Woodys article in order to mobilize
-
Pim
AskWoody Plus
-
-
-
anonymous
GuestJanuary 8, 2018 at 12:56 pm #157414Responding to Woody’s Computer World article when he says: “…The manual-download Security Only update hasn’t had as many problems. Or, at least, as many reported problems…” That is my experience too; no prob w/ Secur Only KB4056897.
From Speccy: Windows 7 Pro 64-bit SP1, 2.5 year-old mass market desktop PC, AMD64, Intel64 Family 6 Model 60 Stepping 3, PROCESSOR_LEVEL 6, PROCESSOR_REVISION 3c03, Intel Pentium G3220, Cores 2, Threads 2, @ 3.00GHz, Family 6, Extended Family 6, Model C, Extended Model 3C, Stepping 3, Revision C0, Haswell 22nm Technology; Installed Secur Only KB4056897 Late morn. Fri. 1/5/2018, along w/ IE 11 Cumulative Secur Update for x64 KB 4056568. Consistently have applied only IE 11-x64, and secur-only x64 updates. Result now: IIRC, a v/e/r/y slow reboot, appx. 4 minutes of black screen; but it did come on, and since that, reboots/ boots normally, and maybe even slightly quicker. No degradation in normal system performance experienced, genlly for word processing, ordinary Net surf, etc.
PS: I have learned to install the secur and IE 11 updates the “old way”: that is, one at a time, genlly security first; then reboot, and install IE 11 one. YMMV. Woody: Continuing: Kudos for everything you do, and have done; without your work, these M$ debacles would be an un-fathomable swamp.
-
anonymous
GuestJanuary 8, 2018 at 2:32 pm #157457PPS:ย Sorry to have omitted following from my original post:ย This is re my own No. 157414, above:ย Before I installed the Secur. only and the IE 11 patches, I *did* find the HKLM key, IIRC, in registry.ย The first thing I had done that morning was update my virus defns. for Avast Free, recent edition of that program; dunno if Avast had inserted it in there, or not; but presumably so.
1 user thanked author for this post.
anonymous
GuestJanuary 8, 2018 at 1:07 pm #157440Is no one paying attention to Microsoft where they state to verify any AntiVirus product you have installed or else it can cause a BSOD?ย ย There is no mention in this article about that.ย People need to read the information that is out there before just blindly patching.
-
Seff
AskWoody PlusJanuary 8, 2018 at 2:38 pm #157466The average user shouldn’t be expected to dig into the registry to check whether a patch is safe or not, and won’t have an opportunity to do so before the patch installs if WU is set to “automatic”.ย It’s a key part of the WU process that Microsoft checks which patches are appropriate to your machine before offering the appropriate patches to you. However,ย if a user checks the patch information note it simply states that “this fix is only being made applicable to the machines where the Anti virus ISV have updated the ALLOW REGKEY” so the clear implication is that if you’re offered the patch then it’s intended for your machine.
The evidence thus far suggests that the system failures aren’t due to people patching a machine that doesn’t meet the requirements, they are due to the particular AMD version that you are running regardless of your AV and whether it meets the registry requirements. So far as I have seen, Microsoft haven’t even acknowledged that there’s a problem with AMD machines, which I find extraordinary given the many hundreds of reports on their own forums.
-
anonymous
Guest
-
anonymous
GuestJanuary 8, 2018 at 3:59 pm #157484Hello, While it is true that people should read the MS articles and known issues, only people who are here at Woody’sย or technically inclined will do so. Do you really feel “mom and pop” are going to do that? The average user will install any update offered by MS because that is what they are supposed to do and with Windows 10, you can’t stop it (unless you are technically inclined).
anonymous
Guestanonymous
Guestanonymous
Guest-
MrBrian
AskWoody_MVP
anonymous
GuestJanuary 8, 2018 at 6:33 pm #157530I am a little thrown off by what Microsoft is implying here …
Until Anti-Virus makers add this registry key, you donโt get any security fixes.
Please note not only does this impact Windows Update, it also impacts Windows Server Update Services (WSUS) and System Center Configuration Manager (SCCM).
Ouch! No more Windows Updates for the unwashed.
Bill C.
AskWoody Plusanonymous
GuestJanuary 8, 2018 at 11:10 pm #157595@Bill C. I don’t think Mint will serve up anything yet. If you go to the github link posted up-thread, it says the Linux kernel patch shipped with 4.14.11, which I believe is for Meltdown. My version of Mint is up to date and is running kernel 4.10.38. Mint is very cautious about what they push out. From that github link:
“[PRIV-LOAD] Linux: KPTILinux kernel page-table isolation. Shipped in Linux 4.14.11 and will ship in 4.15. 4.14.11 version is rough around the edges; future versions should fix further issues.”
I know that the FF mitigation for Spectre was in the repo yesterday.
justaned
1 user thanked author for this post.
-
anonymous
GuestJanuary 8, 2018 at 11:20 pm #157598Allow me to add this : to Ubuntuwicki in reference to kernel patches.
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdownjust an ed
-
Bill C.
AskWoody PlusJanuary 9, 2018 at 1:58 am #157613The caution level in the Mint updates is outstanding. It givea a good deal of preventive steps to take for each level and explains the risks in “plain English.” I believe it is more explanatory than my Ubuntu is, even though they are both using Ubuntu base. I was primarily expecting something on the Community day.
And I do say I am patient to wait.
anonymous
GuestJanuary 9, 2018 at 1:02 am #157608Haven’t found any comments on this, so I’ll toss it out there:
TLDR: I applied the stand-alone x86 patch KB4056897 on a Win7-32bit VM on an Intel Sandy Bridge host.ย Everything normal, no bluescreen, etc.ย I then ran a following validation script (from https://gallery.technet.microsoft.com/scriptcenter/Speculation-Control-e36f0050) which reported that support for kernel VA shadow (Meltdown) was not present nor enabled.
Additional details:
Going through the same patching process on a Win7-64bit VM on the same host resulted in the validation script reporting that kernel VA shadow was both present and enabled.ย Both systems were stock Win7 SP1 with no anti-virus installed, and no registry key set.ย For good measure, I tried setting the registry key on the 32bit VM, installing the 4056894 rollup, installing all windows updates, all with the same result – the validator script reports no Meltdown mitigation present on Win7-32.
The patch did do something though, because after patching the validation script did indicate that branch target injection (Spectre) mitigation was present, but not enabled due to lack of hardware support.ย (This was expected).
So…ย it’s not clear to me if the x86 version of the patch actually patches for Meltdown on Win 7-32 systems.ย It could be the validator script doesn’t work properly, though the fact that it reports a change for Spectre, and reports the expected Meltdown patch state on Win 7-64 seems to argue against that.ย It could be the Meltdown portion of the x86 patch doesn’t work on Win7-32 in a VM (VirtualBox) configuration.ย I haven’t found any other references to this.ย Can anyone duplicate my observations?ย From what I can tell, folks are just happy if the patch applies without a BSOD… but what if the patch doesn’t work as intended?
-
anonymous
GuestJanuary 9, 2018 at 4:48 am #157635see FAQ #7 at link below
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/adv180002
AJNorth
AskWoody PlusJanuary 9, 2018 at 1:36 am #157611For those who use Firefox ESR, this from Mozilla (2018.01.04):
We have released the two timing-related mitigations described above with Firefox 57.0.4, Beta and Developers Edition 58.0b14, and Nightly 59.0a1 dated โ2018-01-04โ and later. Firefox 52 ESR does not support “SharedArrayBuffer” and is less at risk; the “performance.now()” mitigations will be included in the regularly scheduled Firefox 52.6 ESR release on January 23, 2018. (https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/)
-
Kirsty
Manager -
anonymous
Guest
anonymous
GuestJanuary 9, 2018 at 4:38 am #157617Microsoft is aware of the issue with AMD.ย They have paused sending out updates for win 7/ 8.1/10 with AMD Processors. All in the Link Below.
anonymous
GuestJanuary 9, 2018 at 4:43 am #157624Woody: ย Martin Brinkmann is reporting that Microsoft has halted patches for selected AMD devices:
https://www.ghacks.net/2018/01/09/microsoft-halts-security-updates-for-select-amd-devices/
MikeFromMarkham
anonymous
GuestJanuary 9, 2018 at 9:19 am #157736CVE-2017-5753, CVE-2017-5715, and CVE-2017-5754 (Meltdown and Spectre) Windows antivirus patch compatibility:
anonymous
GuestJanuary 9, 2018 at 11:34 am #157779TRY A RECOVERY DISC to get to the command prompt if the builtin recovery does not work after running the command.
We have found that some of our computers were not able to be repaired when running the command from the in builtinย Windows recovery options
dism /image:d:\ /remove-package /packagename:Package_for_RollupFix~31bf3856ad364e35~amd64~~7601.24002.1.4 /norestart
However, using a repair disc worked 100% of the time even on the computers that that had problems when using the builtin repair tools
1 user thanked author for this post.
anonymous
Guest-
PKCano
Manager
anonymous
GuestJanuary 9, 2018 at 7:41 pm #157980I’m running a PC with Windows 8.1 &AMD and I received the KB4056895 Rollup update along with 4 other updates today for patch Tuesday. Didn’t Microsoft say they stoppedย the release of the KB4056895 rollup update for AMD users yesterday.ย I hid the update but I’m disappointed I received it.
-
abbodi86
AskWoody_MVP -
anonymous
Guest
-
Cartoonist Aaron
AskWoody PlusJanuary 10, 2018 at 7:49 pm #158329Hey, if you can’t turn your computer on, it can’t be hacked! #featurenotabug
1 user thanked author for this post.
anonymous
GuestJanuary 11, 2018 at 1:50 am #158375Intel PCs damaged by KB4056892.ย Damage severe if some legacy apps are executed.ย Lists of installed updates vary per how the lists are accessed.ย Some installs continue to be reported after removal.ย ย ย Damage includes “Settings” won’t run.ย Whatever to do about this?ย Only knownย fix is to do a clean install of Windows.
This type of damage seems not well known/publicized.
I have to know if others have the same experience?
Or are we the only ones in the world with this problem?Next: hiding updates only works forย updates that are already on the way.ย One can hide KB4056892 butย what about protecting from what comes next?ย ย Turn off Windows Update service seems extreme.ย But the damage MUST be prevented as impacts are great.
Any comments?ย Ideas?anonymous
GuestJanuary 12, 2018 at 11:32 am #158834I’ve been asked if any of the computers had AMD video cards.ย I don’t know for sure.ย There are so many that it’s possible I suppose – depending on the intended meaning of the question. BUT, all of the computers are (mostly Dell) minitowers that are very likely running on-board video and wouldn’t have been purchased with any add-on video “card”.
-
PKCano
Manager
anonymous
GuestJanuary 14, 2018 at 10:47 am #159345Hello.ย I am here to report that the two patches KB4056568 and KB4056897 when installed in VirtualBox 5.1.30 or 5.2.4 with a Windows 7 x64 guest OS willย cause the guest OS to hang at restart. 8-(
https://forums.virtualbox.org/viewtopic.php?f=2&t=86244
1 user thanked author for this post.
Viewing 29 reply threads - This topic has 62 replies, 19 voices, and was last updated 7 years, 2 months ago by
-

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Nvidia just fixed an AMD Linux bug
by
Alex5723
16 hours, 40 minutes ago -
50 years and counting
by
Susan Bradley
35 minutes ago -
Fix Bluetooth Device Failed to Delete in Windows Settings
by
Drcard:))
4 hours, 16 minutes ago -
Licensing and pricing updates for on-premises server products coming July 2025
by
Alex5723
1 day, 3 hours ago -
Edge : Deprecating window.external.getHostEnvironmentValue()
by
Alex5723
1 day, 3 hours ago -
Rethinking Extension Data Consent: Clarity, Consistency, and Control
by
Alex5723
1 day, 3 hours ago -
OneNote and MS Word 365
by
CWBillow
1 day, 5 hours ago -
Ultimate Mac Buyers Guide 2025: Which Mac is Right For You?
by
Alex5723
1 day, 5 hours ago -
Intel Unison support ends on Windows 11 in June
by
Alex5723
1 day, 6 hours ago -
April 2025 — still issues with AMD + 24H2
by
Kevin Jones
1 day, 6 hours ago -
Windows 11 Insider Preview build 26200.5518 released to DEV
by
joep517
1 day, 17 hours ago -
Windows 11 Insider Preview build 26120.3671 (24H2) released to BETA
by
joep517
1 day, 17 hours ago -
Forcing(or trying to) save Local Documents to OneDrive
by
PateWilliam
2 days, 2 hours ago -
Hotpatch for Windows client now available (Enterprise)
by
Alex5723
1 day, 14 hours ago -
MS-DEFCON 2: Seven months and counting
by
Susan Bradley
15 hours, 36 minutes ago -
My 3 monitors go black & then the Taskbar is moved to center monitor
by
saturn2233
2 days, 11 hours ago -
Apple backports fixes
by
Susan Bradley
1 day, 18 hours ago -
Win 11 24H2 will not install
by
Michael1950
15 hours, 49 minutes ago -
Advice to convert MBR to GPT and install Windows 11 Pro on unsupported PC
by
Andy M
35 minutes ago -
Photos from iPhone to Win 10 duplicating/reformatting to .mov
by
J9438
1 day ago -
Thunderbird in trouble. Here comes Thundermail
by
Alex5723
36 minutes ago -
Get back ” Open With” in context menus
by
CWBillow
3 days, 2 hours ago -
Many AMD Ryzen 9800X3D on ASRock have died
by
Alex5723
1 day, 18 hours ago -
simple general stupid question
by
WSaltamirano
3 days ago -
April 2025 Office non-Security updates
by
PKCano
3 days, 17 hours ago -
Microsoft wants to hear from you
by
Will Fastie
1 day, 8 hours ago -
Windows 11 Insider Preview Build 22635.5160 (23H2) released to BETA
by
joep517
3 days, 20 hours ago -
Europe Seeks Alternatives to U.S. Cloud Providers
by
Alex5723
4 days, 2 hours ago -
Test post
by
Susan Bradley
4 days, 4 hours ago -
Used Systems to delete Temp files Gone WRONG what does this mean?
by
Deo
4 days, 6 hours ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.