Top
Patching Windows for Spectre and Meltdown: A complete guide – ANITH
fade
198153
post-template-default,single,single-post,postid-198153,single-format-standard,eltd-core-1.1.1,flow child-child-ver-1.0.0,flow-ver-1.3.6,eltd-smooth-scroll,eltd-smooth-page-transitions,ajax,eltd-blog-installed,page-template-blog-standard,eltd-header-standard,eltd-fixed-on-scroll,eltd-default-mobile-header,eltd-sticky-up-mobile-header,eltd-dropdown-default,wpb-js-composer js-comp-ver-5.0.1,vc_responsive

Patching Windows for Spectre and Meltdown: A complete guide

Patching Windows for Spectre and Meltdown: A complete guide

On May 21, 2018, Google Project Zero (GPZ), Microsoft and Intel disclosed two new Spectre- and Meltdown-related chip vulnerabilities: Speculative Store Bypass (SSB) and Rogue System Registry Read. The customer risk from both disclosures is low. Then on June 13, 2018, Intel released a security advisory on the Lazy FP State Restore vulnerability, CVE-2018-3665, involving side channel speculative execution.

To read this article in full, please click here

(Insider Story)

Source link

Anith Gopal
No Comments

Post a Comment

1 × one =

This site uses Akismet to reduce spam. Learn how your comment data is processed.