引用:
作者marks
http://seclists.org/microsoft/2018/q2/24
今天收到email通知, 不知道是又要補什麼漏洞的意思嗎?
|
KB4284835 (OS Build 17134.112)的第一項更新條目:
Provides protections from an additional subclass of speculative execution side channel vulnerability known as Speculative Store Bypass (CVE-2018-3639). These protections aren't enabled by default. For Windows client (IT pro) guidance, follow the instructions in KB4073119. For Windows Server guidance, follow the instructions in KB4072698. Use this guidance document to enable mitigations for Speculative Store Bypass (CVE-2018-3639) in addition to the mitigations that have already been released for Spectre Variant 2 (CVE-2017-5715) and Meltdown (CVE-2017-5754).
谷歌翻譯:
為推測性執行端通道漏洞的另一個子類提供保護,稱為Speculative Store Bypass(CVE-2018-3639)。這些保護默認情況下不啟用。對於Windows客戶端(IT pro)指導,請按照KB4073119中的說明進行操作。對於Windows Server指導,請 按照KB4072698中的說明進行 操作。除了針對Specter Variant 2(CVE-2017-5715)和Meltdown(CVE-2017-5754)已發布的緩解措施以外,還可以使用此指導文檔為Speculative Store Bypass(CVE-2018-3639)啟用緩解措施。