The most important changes and improvements brought by these two patches focus on improving the overall OS security level against the latest Spectre and Meltdown threat versions, as well as fixing high CPU usage on particular computer models. Here’s how Microsoft describes these two improvements:
Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel Core processors and Intel Xeon processors. Make sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the Windows Client and Windows Server guidance KB articles. (These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS editions.) Addresses an issue that causes high CPU usage that results in performance degradation on some systems with Family 15h and 16h AMD processors. This issue occurs after installing the June 2018 or July 2018 Windows updates from Microsoft and the AMD microcode updates that address Spectre Variant 2.
The updates also add additional protection against a vulnerability involving side-channel speculative execution known as Lazy Floating Point (FP) State Restore. This is not the first time that Microsoft has rolled out Lazy Floating Point fixes, and it seems this issue has yet to be fully patched. Microsoft is not aware of any issues affecting KB4343900 or KB4343899. If you encountered any issues after installing these updates, use the comments below to tell us more about your experience. For additional information, go to Microsoft’s Support pages:
KB4343900 KB4343899
RELATED STORIES TO CHECK OUT:
FIX: File Explorer crashes in Windows 7, 8, 8.1 Windows 10 is pulling ahead from Windows 7, says StatCounter Microsoft drops Windows 7 support on Pentium III CPUs
Name *
Email *
Commenting as . Not you?
Save information for future comments
Comment
Δ