Specific vulnerability details for these silicon-based issues can be found in the following security advisories and CVEs:ĪDV180002 - Guidance to mitigate speculative execution side-channel vulnerabilitiesĪDV180012 - Microsoft Guidance for Speculative Store BypassĪDV180013 - Microsoft Guidance for Rogue System Register ReadĪDV180016 - Microsoft Guidance for Lazy FP State RestoreĪDV180018 - Microsoft Guidance to mitigate L1TF variantĪDV190013 - Microsoft Guidance to mitigate Microarchitectural Data Sampling vulnerabilitiesĪDV220002 - Microsoft Guidance on Intel Processor MMIO Stale Data VulnerabilitiesĬVE-2022-23825 AMD CPU Branch Type Confusion It also provides a comprehensive list of Windows client and server resources to help keep your devices protected at home, at work, and across your enterprise. This article provides information and updates for a new class of silicon-based microarchitectural and speculative execution side-channel vulnerabilities that affect many modern processors and operating systems. Removed a duplicated topic titled "Intel microcode updates" in the "Steps to help protect your Windows devices" section Removed content about CVE-2022-23816 as the CVE number is unused
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |