IT&Software

Windows 10 updates trigger display issues on AMD computers

Windows 10 updates trigger display issues on AMD computers

The software giant provides Windows 10 for free to anyone using assistive technologies, and doesn't require you to prove you have any kind of disability in order to make use of this upgrade offer. This risk has seemingly yet to be exploited; there was no evidence that either vulnerability has led to a security issue being enacted.

Third-party Windows antivirus products need to support Microsoft's security update and set a Windows registry key for customers to receive the update via Windows Update. Based on the analysis to date, many types of computing devices - with many different vendors' processors and operating systems - are susceptible to these exploits.

A Microsoft spokesperson confirmed to The Verge that the updates are currently rolling out now, and they can be downloaded by either checking with the device's internal update system or by visiting the Microsoft Download Center.

Microsoft did not immediately respond to a request for comment.

The software update protects devices from the so-called Spectre and Meltdown vulnerabilities affecting Intel, ARM and AMD chipsets.

More news: Arsene Wenger plans Alexis Sanchez exit in January
More news: Police searching for missing Texas journalist
More news: 'Three Billboards' wins big as Golden Globes power through sex scandal

Not every Windows computer is receiving Microsoft's patch to address the "Meltdown" and "Spectre" vulnerabilities. In fact, Microsoft says in a Sunday alert that neither KB4056892 nor any future security updates will be installed so long as they're running incompatible anti-virus software.

As first spotted by The Register, a lengthy thread on Microsoft's Answers forum is filled with users reporting that their older AMD Athlon-powered PCs are now refusing to boot past the Windows startup logo.

Another potential fix is to activate metered connections in Windows 10 which can prevent the update from installing. In a statement, Intel said: "Intel and other technology companies have been made aware of new security research describing software analysis methods that, when used for malicious purposes, have the potential to improperly gather sensitive data from computing devices that are operating as designed".

Variant 3: "rogue data cache load" (CVE-2017-5754), Meltdown attack.

Intriguingly, in AMD's response to Google Project Zero's findings, the chip maker downplayed the effects of the Meltdown and Spectre flaws on its processors.