brucesherwin

Hyper-V HyperClear RETbleed Update

Multiple new speculative execution side channel issues were recently disclosed by both Intel and AMD.  These issues were described in security bulletins available here: AMD CPU Branch Type Confusion | AMD Return Stack Buffer Underflow / CVE-2022-29901, CVE-2022-28693 /… (intel.com) These hardware vulnerabilities are officially referred to as CVE-2022-23825 (Branch Type Confusion), CVE-2022-29900 (RETbleed), CVE-2022-29901 …

Hyper-V HyperClear RETbleed Update Continue Reading

Virtualization-Based Security: Enabled by Default

Virtualization-based Security (VBS) uses hardware virtualization features to create and isolate a secure region of memory from the normal operating system. Windows can use this “virtual secure mode” (VSM) to host a number of security solutions, providing them with greatly increased protection from vulnerabilities in the operating system, and preventing the use of malicious exploits …

Virtualization-Based Security: Enabled by Default Continue Reading

5/14: Hyper-V HyperClear Update

Four new speculative execution side channel vulnerabilities were announced today and affect a wide array of Intel processors. The list of affected processors includes Intel Xeon, Intel Core, and Intel Atom models. These vulnerabilities are referred to as CVE-2018-12126 Microarchitectural Store Buffer Data Sampling (MSBDS), CVE-2018-12130 Microarchitectural Fill Buffer Data Sampling (MFBDS), CVE-2018-12127 Microarchitectural Load …

5/14: Hyper-V HyperClear Update Continue Reading