Windows Update KB4078130 deactivates Spectre Patch

Martin Brinkmann
Jan 29, 2018
Updated • Jan 29, 2018
Windows
|
32

Microsoft released the Windows Update KB4078130 yesterday. It disables the mitigation against Spectre, Variant 2 on all supported versions of the company's Windows operating system when installed.

Microsoft released updates for Windows on the January 2018 Patch Day to mitigate Spectre and Meltdown vulnerabilities disclosed earlier. The company stopped the distribution of these updates to select AMD devices shortly after initial deployment because it caused blue screen of death crashes on Windows 7 machines with AMD hardware.

Intel acknowledged "higher than expected reboots and other unpredictable behavior" and recommended to customers on January 22nd that customers "stop deploying the current microcode version on impacted processors."

RedHat reverted patches on January 21st already.

KB4078130 deactivates Spectre Patch

KB4078130 is not offered through Windows Update. The update is available on the Microsoft Update Catalog website. Users and admins need to download it manually to install it on affected systems.

The update is available for all supported versions of Windows -- client and server. It has a size of 24 Kilobytes.

Microsoft recommends that the patch is only applied to systems on which unexpected reboots or other issues are noticed after installation of the January 2018 security updates.

Registry

The update is not the only option that admins have to deactivate the patch. Admins may change values in the Windows Registry directly to activate or deactivate the patch. Microsoft highlights how that is done on this Support page.

Tip: We have uploaded batch scripts to our server which you can download and run to enable or disable the Spectre Variant 2 protection. Download the file with a click on the following link: (Download Removed)

You may use InSpectre by Gibson to disable the protection as well.

To disable Spectre Variant 2:

reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverride /t REG_DWORD /d 1 /f

reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 1 /f

To enable Spectre Variant 2:

reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverride /t REG_DWORD /d 0 /f

reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 1 /f

Closing Words

Disabling the protection should resolve unexpected reboot and other issues caused by the Spectre Variant 2 patch. It is not necessary to install the updates on systems that run without any of these issues after update installation. (via Born and Deskmodder)

Related articles

Summary
Windows Update KB4078130 deactivates Spectre Patch
Article Name
Windows Update KB4078130 deactivates Spectre Patch
Description
Microsoft released the Windows Update KB4078130 yesterday which disables the mitigation against Spectre, Variant 2 on all supported versions of the company's Windows operating system.
Author
Publisher
Ghacks Technology News
Logo
Advertisement

Tutorials & Tips


Previous Post: «
Next Post: «

Comments

  1. Martin said on February 2, 2018 at 3:08 pm
    Reply

    Ref: Windows Patch KB4078130

    Having Right Clicked and ‘run’ the Windows ‘Out of Band’ .exe Patch (then re-booted) – there was no sign of it in Windows Update History (nor in the Updates Uninstall Log).

    Neither I nor a Microsoft Support Agent (who remotely accessed by PC for well over 30 Minutes looking for it) could find the bleeping thing.

    So…now have no idea if it’s in and working, or if it never actually installed.

    The Microsoft Support Agent looked in the Registry, but he did not appear aware of ‘what’ he was looking for in there.

    Is there a quick search for any new Registry Keys that the Patch might have deployed, that would confirm the Patch ‘did’ install? (I’m a not sure how to ‘safely’ search the Registry).

    Reluctant to (once again) try running the .exe file from the Microsoft Catalog, in case my Computer explodes or something.

    Thanks in advance for any Comments / thoughts (Have a great Weekend)

  2. Walter Arloff said on February 1, 2018 at 12:57 pm
    Reply

    According to the Microsoft Reference : “… This update covers Windows 7 (SP1), Windows 8.1, and all versions of Windows 10, for client and server. “.

    So that to the contrary of the Microsoft Reference subtitle and of the content of this article, this should not concern W2K8 R2 and W2K12 R2, but only W7, W8 and W10 (also when used as a Server).

    Microsoft Reference : https://support.microsoft.com/en-us/help/4078130/update-to-disable-mitigation-against-spectre-variant-2

  3. Walter Arloff said on February 1, 2018 at 12:41 pm
    Reply

    According to the Microsoft reference : “This update covers Windows 7 (SP1), Windows 8.1, and all versions of Windows 10, for client and server.”

    W2K8 R2 and W2K12 R2 seem not to be covered by this (KB4078130).

    Reference : https://support.microsoft.com/en-us/help/4078130/update-to-disable-mitigation-against-spectre-variant-2

  4. Sophie said on January 30, 2018 at 11:32 am
    Reply

    AskWoody writes………………………… :

    So, the proverbial bottom line: Should you be concerned?

    Short answer, no. In particular, if you’ve followed my recommendations and avoided this entire Meltdown/Spectre upgrading debacle — haven’t installed any of this month’s patches, haven’t installed the latest BIOS/UEFI microcode — there’s nothing in KB 4078130 that’s of interest.

    On the other hand, if you have installed your vendor’s microcode update, and you’ve installed the January Windows patches (one or more of the gazillion on offer), and you’re having problems — your machine stops unexpectedly, or performance hit the bottom of a molasses sludge pit — then installing KB 4078130 may help. Or maybe not.

  5. AnorKnee Merce said on January 30, 2018 at 10:52 am
    Reply

    There are 2 ways to patch for the Spectre 2 bug, the IBRS and IBPB features(= need OS kernel and CPU updates) and/or Google’s Retpoline software feature(= only need OS kernel updates).
    … Retpoline also results in minimal performance hit on CPUs but requires extra work to recompile stuffs in the OS.
    … IBRS and IBPB results in significant performance hit on CPUs, especially for Cloud servers(= about -30%).

    Linux is moving towards implementing the Retpoline method, eg Linus Torvald/kerneldotorg’s Linux kernel 4.15 has Retpoline built-in = may not need the Linux kernel and CPU microcode updates for IBRS and IBPB.
    … AFAIK, Windows is not moving towards the Retpoline method, ie still sticking with the IBRS/IBPB method.

  6. dark said on January 30, 2018 at 2:01 am
    Reply

    Raspberry Pi is not vulnerable to meltdown nor spectre.

    raspberrypi.org/blog/why-raspberry-pi-isnt-vulnerable-to-spectre-or-meltdown/

  7. someon said on January 29, 2018 at 7:22 pm
    Reply

    so a flip of the registry setting can disable the “protection” ?! that’s not very promising. What is to stop a virus to to do the same?

  8. pHROZEN gHOST said on January 29, 2018 at 6:26 pm
    Reply

    @Martin, thanks for the registry changes. InSpectre refuses to change anything even when run as administrator. The appropriate button remains disabled on my AMD PC.

  9. kalmly said on January 29, 2018 at 4:58 pm
    Reply

    Staying out of it altogether on my unpatched Win7s and my good ol’ patched XP.

  10. Ben said on January 29, 2018 at 4:24 pm
    Reply

    Which are the patches that slow down the PC exactly?
    And can those be disabled via registry?

  11. pHROZEN gHOST said on January 29, 2018 at 3:53 pm
    Reply

    When that nasty update for 1709 came out, this PC was fine. My AMD machine was not fine. It kept trying to install it and failed (always at 25%). The overhead on the PC was unbearable. To make matters worse, the Win 8 Video driver I had been forced to use for my old NVIDIA video chip was replaced by a lousy MS version. I rolled it back to a full HD backup from July 29 2017. SInce then it has updated itself. All is well … until the next fiasco.

  12. chesscanoe said on January 29, 2018 at 2:02 pm
    Reply

    If you download version 6 of Inspectre you now actually get version 6a. FWIW.

    1. Sophie said on January 29, 2018 at 3:49 pm
      Reply

      Wasn’t there an “Inspectre Gadget”? ……….oh wait….that must have been Inspector Gadget. Silly me!

      1. Tom Hawack said on January 29, 2018 at 4:43 pm
        Reply

        An amazingly pertinent confusion, Sophie! Both from now on will remind me of one another. Unfortunately the funny one is 30 years old and the sordid one is a new-born rascal :=)

      2. Sophie said on January 29, 2018 at 5:34 pm
        Reply

        Hello Tom………….grinning from ear to ear now, having read your reply!!

        Shame we can’t insert a little picture of the rascal — here, in the body of these messages!

        Was that really thirty years ago? Best hurry and get my walking stick!!!!

      3. Tom Hawack said on January 29, 2018 at 5:57 pm
        Reply

        @Sophie, when I describe Inspectre as a little rascal I mean Spectre of course (I had in mind “Spectre In(side”)) and not Gibson’s InSpectre diagnostic tool…

        ‘Inspector Gadget’, the cartoon, is at least 30 years old. Recalls me Sunday afternoons in Amsterdam where my girlfriend (then) and I would eat good little things between two laughs about dear Inspector on TV :=) Nice times! No tapenade there, rather haring with onions, lol.

      4. Sophie said on January 29, 2018 at 7:06 pm
        Reply

        @Tom – Yes……and I quickly realised that the rascal in question was not the original protagonist!

        But guess what Tom………I did not dare to (E)dit my comment……here on Ghacks…..because we all know what happens to edited comments…… don’t we!!!!

        Tapenade……..Onions…..Inspector Gadget……….. there clearly are no areas that Ghacks commentaries cannot venture into! Hurrah to that!

        So yes…..of course, the rascal is the latter, and I soon realised my error, but could do nothing to correct it.

  13. Yuliya said on January 29, 2018 at 1:55 pm
    Reply

    I think it’s safe to say, wait for March or April’s “Patch Tuesday” if you want to update your Windows PC, regardless of version. I honestly don’t believe they’ll get it right on 13.02.2018 either.
    I’m running Win7 and Server2016, both updated to December 2017, with no issues whatsoever. No reason to complicate things.
    While we’re at it, leave your BIOS alone. If your machine works, don’t break it.

    1. scorpiogreen said on January 30, 2018 at 6:44 am
      Reply

      >”While we’re at it, leave your BIOS alone. If your machine works, don’t break it.”

      I’ve always updated to the latest version of the BIOS and never had any problems. It’s when I didn’t update, I had the problems, especially on a new computer that’s getting all the kinks worked out of it.

      Based upon my experience, typically new BIOS updates only go on for a year or so, anyway. Beyond that, they figure your machine doesn’t need it anymore or it’s too old, out of warranty and not worth bothering with anymore.

    2. Sophie said on January 29, 2018 at 3:48 pm
      Reply

      >>While we’re at it, leave your BIOS alone. If your machine works, don’t break it.

      Spot on. Never rush these things….look and see what’s happening…. BIOS updating is a scary place for almost anyone, and the more the device “matters”, the more the worry. Twas always so, even way back when.

      Personally, I’m sceptical about Microsoft having suddenly nailed this. Just have a look at Reddit/Win10 and you’ll see a glimpse of the real world, rather than the spin.

      And hard to have any real guarantees about new CPUs being “clean”. For one thing….how long will that take, and how will it be certified?

      Remember, as at this writing, no active exploits in the wild. My advice? Cover all your bases in a myriad of ways (there are so many things you can do in mitigation), and then relax…..have a nice frothy coffee! :)

      I won’t be touching my BIOS in a million years. I’m reasonably comfortable with settings offered, and even then I don’t like changing them, nevermind flashing them.

      1. Tom Hawack said on January 29, 2018 at 4:55 pm
        Reply

        > And hard to have any real guarantees about new CPUs being “clean”. For one thing….how long will that take, and how will it be certified?

        Indeed. To put a complex process in simple words, what’s up with the manufacturing of CPUs? They are acknowledged as holding the flaws we know and yet continue to be built, sold, assembled? What’s the route plan if any for new, “clean”, free of Meltdown/Spectre processors? Or is it that nothing will be done on the hardware itself, only soft-patches at the horizon? If I buy a new computer tomorrow will it be an infected one? What’s the idea of CPUs’ future?

      2. Sophie said on January 29, 2018 at 5:33 pm
        Reply

        Hello Tom, yes….absolutely. Just look at the car emissions scandals, and the obfuscation, and the “drip drip” of information from certain manufacturers, with regard to what devices they did or didn’t fit to their motor vehicles, to influence the output of emissions, as certified and recorded.

        The point is, with big business, and sometimes Billions, not even Millions of $$$ – you can only ultimately look after yourself and your own security.

        A little sticker one day….like the ones that used to say “Made for XP” but that says “Groovy CPU inside, we promise!” ….will never be quite enough to satisfy the curious. (Like us!)

    3. Tom Hawack said on January 29, 2018 at 2:15 pm
      Reply

      I certainly won’t update the BIOS. The patches mentioned here and there nearly drove me mad last time I read about them because I was facing what I felt as out of my knowledge, control. Too risky. Even pros practice and advise extreme caution when it comes to manipulating the BIOS, I’ve read that over and over since 20 years.

  14. hahahah= said on January 29, 2018 at 12:55 pm
    Reply

    I simply skip these crappy updates on my win8.1, leaving it “unsecured” but saving me from performance issues.

    1. TianlanSha said on January 29, 2018 at 3:58 pm
      Reply

      I haven’t installed any updates on my Windows 7 SP1. It has all the VC++ and .NET packages installed, but no updates.

    2. Tom Hawack said on January 29, 2018 at 2:08 pm
      Reply

      Saving from performance issues… and from patches’ issues.
      I won’t buy a new computing device before I have the guarantee it has a “Clean-CPU Inside” and I wonder how long it will take for getting such re-thought, re-built processors.

    3. Sophie said on January 29, 2018 at 1:17 pm
      Reply

      Yes, the “cure” is nearly always worse than the original issue.

  15. 420 said on January 29, 2018 at 12:51 pm
    Reply

    The only fair thing to do at this point is for Intel and AMD to give everyone affected a new fixed cpu, but we all know that won’t happen. Let the shit show continue.

    1. intelHype said on January 30, 2018 at 2:34 am
      Reply

      Just buy their next gen 9/10 CPU at 2x the price.

    2. John Fenderson said on January 29, 2018 at 6:09 pm
      Reply

      They don’t have a new, fixed CPU to give. It will take a fair bit of time to spin up new silicon.

    3. Arthur said on January 29, 2018 at 3:15 pm
      Reply

      That would mean replacing all CPUs sold in the past 20 years. Hardly possible for any company, don’t you think?

      1. Anonymous said on February 2, 2018 at 8:47 pm
        Reply

        Sure…better to have billions of people and companies do it even though it wasn’t their fault.

Leave a Reply

Check the box to consent to your data being stored in line with the guidelines set out in our privacy policy

We love comments and welcome thoughtful and civilized discussion. Rudeness and personal attacks will not be tolerated. Please stay on-topic.
Please note that your comment may not appear immediately after you post it.