- Meltdown/Spectre Part II: A primer on mitigations of new Side-Channel Vulnerability Variants 3a (Rogue System Register Read) and 4 (Speculative Store Bypass) for Windows and VMware environments https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/cve-2017-5715-and-hyper-v-vms 18 comments sysadmin
Linking pages
- KB4072698: Windows Server and Azure Stack HCI guidance to protect against silicon-based microarchitectural and speculative execution side-channel vulnerabilities - Microsoft Support https://support.microsoft.com/en-us/topic/windows-server-guidance-to-protect-against-speculative-execution-side-channel-vulnerabilities-2f965763-00e2-8f98-b632-0d96f30c8c8e 10 comments
- KB4072698: Windows Server and Azure Stack HCI guidance to protect against silicon-based microarchitectural and speculative execution side-channel vulnerabilities - Microsoft Support https://support.microsoft.com/en-au/topic/2f965763-00e2-8f98-b632-0d96f30c8c8e 4 comments
- KB4072698: Windows Server and Azure Stack HCI guidance to protect against silicon-based microarchitectural and speculative execution side-channel vulnerabilities - Microsoft Support https://support.microsoft.com/en-us/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution 2 comments
- GitHub - hannob/meltdownspectre-patches: Summary of the patch status for Meltdown / Spectre https://github.com/hannob/meltdownspectre-patches 0 comments
Related searches:
Search whole site: site:docs.microsoft.com
Search title: Protecting guest virtual machines from CVE-2017-5715 (branch target injection) | Microsoft Learn
See how to search.