Source |
CSO |
Identifiant |
1130720 |
Date de publication |
2019-05-29 03:00:00 (vue: 2019-05-29 13:00:18) |
Titre |
How to update your Spectre, Meltdown mitigations for the Retpoline mitigation |
Texte |
The Spectre and Meltdown vulnerabilities discovered in January 2018 showed that weaknesses in CPUs were a potential attack vector. They allow a rogue process to read memory without authorization. Patches were rolled out along with bios updates from the manufacturer, but they came with a costly side effect: They degraded performance, especially on systems with older CPUs. Microsoft enabled the protections by default on workstations, but not on server platforms. |
Envoyé |
Oui |
Condensat |
2018 allow along article attack authorization bios but came click costly cpus default degraded discovered effect: enabled especially from full here how january manufacturer meltdown memory microsoft mitigation mitigations not older out patches performance platforms please potential process protections read retpoline rogue rolled server showed side spectre systems update updates vector vulnerabilities weaknesses without workstations your |
Tags |
|
Stories |
|
Notes |
|
Move |
|