The problem was no doubt exacerbated by vendors rushing to ship even basic mitigations for the Meltdown and Spectre flaws (see Meltdown and Spectre: Patches and Workarounds Appear).
Microsoft said on Tuesday the patches released to guard against the Meltdown and Spectre security threats slowed down some personal computers and servers, with systems running on older Intel processors seeing a noticeable decrease in performance.
The fixes, though, could slow down older machines and servers, Microsoft said. Older versions of Windows have a larger performance impact because Windows 7 and Windows 8 have more user-kernel transitions because of legacy design decisions, such as all font rendering taking place in the kernel.
This means that users who suffer from the patch issue will therefore need to disable Windows Update, as their only option.
Intel's shares sank in the two days after the chip vulnerabilities were disclosed last week, while AMD shares are up more than 15% since January 2, the day before news of the security flaws was widely disclosed. Intel has gone to great lengths to stress that Spectre and Meltdown are not "unique to any one architecture or processor implementation".
Microsoft said that it is still testing the speed impacts of updating systems, and it doesn't have concrete numbers yet.
So, Microsoft suspended the security update for computers with AMD chips.
There's no timeline yet for when the problem might get resolved and working updates for affected AMD systems released.
"Yes, it's a security risk, but it's also at the hardware level", Falcon told CRN. Meltdown gives a bad actor the opportunity to access the memory sitting between the operating system and the programs it runs. Most companies with adequate, multi-tier security have less to worry about with this exploit.