Information / guidelines regarding "Meltdown" and "Spectre" security vulnerability discovered in modern CPU's...
 

Hatteland Display is the leading technology provider of maritime display and computer products

Information / guidelines regarding "Meltdown" and "Spectre".
January 08, 2018 | 13:57


Security vulnerability discovered in modern CPU's.


Intel and AMD has released public information, please review links below.
Microsoft has also provided information regarding security updates for a number of Operating Systems.


Hatteland Display uses the following Windows 10:
Windows 10 Version 1607 / Windows Server 2016 Monthly quality x86/x64 (KB4056890)


To summarize and adding the KB numbers (useful to search on support.microsoft.com and on the catalog website for download):

Windows 7 / Windows Embedded Standard 7 / Windows Server 2008 R2
Monthly quality x86/x64 (KB4056894)
Security only x86/x64 (KB4056897)

Windows 8.1 / Windows Server 2012 R2
Security only x86/x64 (KB4056898)

Windows Embedded 8 Standard / Windows Server 2012
Monthly quality x86/x64 (KB4056896)
Security only x86/x64 (KB4056899)

Windows 10 Version 1507 Monthly quality x86/x64 (KB4056893)
Windows 10 Version 1511 Monthly quality x86/x64 (KB4056888)
Windows 10 Version 1607 / Windows Server 2016 Monthly quality x86/x64 (KB4056890)
Windows 10 Version 1703 Monthly quality x86/x64 (KB4056891)
Windows 10 Version 1709 / Windows Server 2016 (1709) Monthly quality x86/x64 (KB4056892)

Additionally, there's an out of band update for W10 1709: Windows 10 Version 1709 Critical out of band x86/x64 (KB4058702).


POSReady 7 is the same bits as Windows 7 & Windows Embedded Standard 7 so
Monthly quality x86/x64 (KB4056894)
Security only x86/x64 (KB4056897)

CE & XP:
For CE&XP based systems, unfortunately there is no fix at this time.

My Operating system (OS) is not listed. When can I expect a fix to be released?
Addressing a hardware vulnerability with a software update presents significant challenges and mitigations for older operating systems require extensive architectural changes. Microsoft is continuing to work with affected chip manufacturers and to investigate the best way to provide mitigations, which may be provided in a future update.


Although both WES2009 & POSReady 2009 are still under extended support (until mid-2019).

Resources:
See links below for more resources and information from Microsoft.




Please review these links for more:
Click to open urlIntel PR Response to Security Research Findings
Click to open urlIntel Investor Relations Call Replay - 1/3 Investor call regarding security research findings
Click to open urlIntel Microsite - Facts about Side-Channel Analysis and Intel Products
Click to open urlIntel Product Security Center - IPSC SA-00088 information
Click to open urlAn Update on AMD Processor Security
Click to open urlwww.catalog.update.microsoft.com
Click to open urlWindows Client Guidance for IT Pros to protect against speculative execution side-channel vulnerabilities
Click to open urlWindows Server guidance to protect against speculative execution side-channel vulnerabilities
Click to open urlImportant: Windows security updates released January 3, 2018, and antivirus software
Click to open urlhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
Click to open urlSecuring Azure customers from CPU vulnerability
Click to open urlMicrosoft cloud protections against speculative execution side-channel vulnerabilities



Copyright © 2018 Hatteland Display® AS - All international rights reserved.

Contact us: +47 4814 2200 - mail@hatteland-display.com
Information, pictures, illustrations and content may not, in whole or in part, be copied, photocopied, reproduced,
translated or reduced to any electronic medium or machine-readable form from this website without the prior
written consent of Hatteland Display AS. The products may not be copied or duplicated in any way.