Warning: Constant WP_TEMP_DIR already defined in /var/www/html/blogs/glenn/wp-config.php on line 94

Warning: Cannot modify header information - headers already sent by (output started at /var/www/html/blogs/glenn/wp-config.php:94) in /var/www/html/blogs/glenn/wp-includes/rest-api/class-wp-rest-server.php on line 1902

Warning: Cannot modify header information - headers already sent by (output started at /var/www/html/blogs/glenn/wp-config.php:94) in /var/www/html/blogs/glenn/wp-includes/rest-api/class-wp-rest-server.php on line 1902

Warning: Cannot modify header information - headers already sent by (output started at /var/www/html/blogs/glenn/wp-config.php:94) in /var/www/html/blogs/glenn/wp-includes/rest-api/class-wp-rest-server.php on line 1902

Warning: Cannot modify header information - headers already sent by (output started at /var/www/html/blogs/glenn/wp-config.php:94) in /var/www/html/blogs/glenn/wp-includes/rest-api/class-wp-rest-server.php on line 1902

Warning: Cannot modify header information - headers already sent by (output started at /var/www/html/blogs/glenn/wp-config.php:94) in /var/www/html/blogs/glenn/wp-includes/rest-api/class-wp-rest-server.php on line 1902

Warning: Cannot modify header information - headers already sent by (output started at /var/www/html/blogs/glenn/wp-config.php:94) in /var/www/html/blogs/glenn/wp-includes/rest-api/class-wp-rest-server.php on line 1902

Warning: Cannot modify header information - headers already sent by (output started at /var/www/html/blogs/glenn/wp-config.php:94) in /var/www/html/blogs/glenn/wp-includes/rest-api/class-wp-rest-server.php on line 1902

Warning: Cannot modify header information - headers already sent by (output started at /var/www/html/blogs/glenn/wp-config.php:94) in /var/www/html/blogs/glenn/wp-includes/rest-api/class-wp-rest-server.php on line 1902
{"id":1312,"date":"2018-01-08T08:16:30","date_gmt":"2018-01-08T16:16:30","guid":{"rendered":"http:\/\/3.209.169.194\/blogs\/glenn\/?p=1312"},"modified":"2020-01-11T12:51:56","modified_gmt":"2020-01-11T20:51:56","slug":"checking-your-meltdown-and-spectre-mitigation-status-in-windows","status":"publish","type":"post","link":"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-meltdown-and-spectre-mitigation-status-in-windows\/","title":{"rendered":"Checking Your Meltdown and Spectre Mitigation Status in Windows"},"content":{"rendered":"

As I have previously discussed<\/a>, there has been an explosion of information and speculation about the Spectre and Meltdown vulnerabilities. Here is the official information about all three vulnerabilities.<\/font><\/p>\n


<\/font><\/p>\n

Spectre<\/strong><\/font><\/p>\n

CVE-2017-5753 (Bounds Check Bypass)<\/font><\/p>\n

CVE-2017-5715 (Branch Target Injection)<\/font><\/p>\n


<\/font><\/p>\n

Meltdown<\/strong><\/font><\/p>\n

CVE-2017-5754 (Rogue Data Cache Load)<\/font><\/p>\n


<\/font><\/p>\n

Checking Your Meltdown and Spectre Mitigation Status in Windows<\/strong><\/font><\/p>\n

Microsoft has released a PowerShell module that you can easily use to check whether you have the operating system patch that helps mitigate CVE-2017-5715 (Spectre – Branch Target Injection) installed and enabled, along with a BIOS\/CPU microcode update that is also required as part of the mitigation. <\/font><\/p>\n

The script also shows whether you have the operating system patch to mitigate CVE-2017-5754 (Meltdown \u2013 Rogue Data Cache Load) installed and enabled, along with whether you have OS support for the PCID performance optimization, which relies on hardware support in your processor for the process-context identifiers (PCID) feature to reduce the performance impact of the CVE-2017-5754 patch.<\/font><\/p>\n

This Microsoft KB article explains this in more detail and has a link to download<\/a> the PowerShell Module for operating systems prior to Windows Server 2016.<\/font><\/p>\n

\n

Windows Client Guidance for IT Pros to protect against speculative execution side-channel vulnerabilities<\/a><\/font><\/p>\n<\/blockquote>\n

I have a Dell Precision 5520 laptop with an Intel Xeon E3-1505M v6 processor<\/a>, running Windows 10 Professional Version 1709 (OS Build 16299.192) with the January 2018 Security Update (KB4056892) installed. I have also installed BIOS version 1.7.0 for the Dell Precision 5520, which has the firmware update to help mitigate CVE-2017-5715.<\/font><\/p>\n

Figure 1 shows the results I get after installing both of these updates.<\/font><\/p>\n


<\/font><\/p>\n

\"clip_image002\"<\/a><\/p>\n

Figure 1: Get-SpeculationControlSettings Results on Fully Patched Dell Precision 5520<\/strong><\/font><\/p>\n


<\/font><\/p>\n

I also have a ASRock Fatal1ty X399 Professional Gaming<\/a> desktop system with an AMD Ryzen Threadripper 1950X processor, running Windows 10 Professional Version 1709 (OS Build 16299.192) with the January 2018 Security Update (KB4056892) installed. I have the latest BIOS version 2.00 for the ASRock Fatal1ty X399 Professional Gaming (which does not include the CVE-2017-5715 firmware fix). ASRock has not released an updated BIOS for this issue yet.<\/font><\/p>\n

Figure 2 shows the results after installing the Windows 10 January 2018 Security Update. It is also notable that the Get-SpeculationControlSettings module does not think that this modern AMD processor needs kernel VA shadowing (meaning that it is not vulnerable to CVE-2017-5754).<\/font><\/p>\n

\"image\"<\/a><\/p>\n

Figure 2: Get-SpeculationControlSettings Results on Partially Patched ASRock Fatal1ty X399 Professional Gaming<\/strong><\/font><\/p>\n

This Microsoft KB article explains in great detail how to interpret the results of Get-SpeculationControlSettings<\/font><\/p>\n

\n

Understanding Get-SpeculationControlSettings PowerShell script output<\/a><\/font><\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"

As I have previously discussed, there has been an explosion of information and speculation about the Spectre and Meltdown vulnerabilities. Here is the official information about all three vulnerabilities. Spectre CVE-2017-5753 (Bounds Check Bypass) CVE-2017-5715 (Branch Target Injection) Meltdown CVE-2017-5754 (Rogue Data Cache Load) Checking Your Meltdown and Spectre Mitigation Status in Windows Microsoft has […]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,17,20,24,343],"tags":[366,367],"class_list":["post-1312","post","type-post","status-publish","format-standard","hentry","category-amd","category-sql-server-hardware","category-intel","category-processors","category-security","tag-meltdown","tag-spectre"],"yoast_head":"\nChecking Your Meltdown and Spectre Mitigation Status in Windows - Glenn Berry<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-meltdown-and-spectre-mitigation-status-in-windows\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Checking Your Meltdown and Spectre Mitigation Status in Windows - Glenn Berry\" \/>\n<meta property=\"og:description\" content=\"As I have previously discussed, there has been an explosion of information and speculation about the Spectre and Meltdown vulnerabilities. Here is the official information about all three vulnerabilities. Spectre CVE-2017-5753 (Bounds Check Bypass) CVE-2017-5715 (Branch Target Injection) Meltdown CVE-2017-5754 (Rogue Data Cache Load) Checking Your Meltdown and Spectre Mitigation Status in Windows Microsoft has […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-meltdown-and-spectre-mitigation-status-in-windows\/\" \/>\n<meta property=\"og:site_name\" content=\"Glenn Berry\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-08T16:16:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-11T20:51:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-content\/uploads\/2018\/01\/clip_image002_thumb.jpg\" \/>\n<meta name=\"author\" content=\"Glenn Berry\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Glenn Berry\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-meltdown-and-spectre-mitigation-status-in-windows\/\",\"url\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-meltdown-and-spectre-mitigation-status-in-windows\/\",\"name\":\"Checking Your Meltdown and Spectre Mitigation Status in Windows - Glenn Berry\",\"isPartOf\":{\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-meltdown-and-spectre-mitigation-status-in-windows\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-meltdown-and-spectre-mitigation-status-in-windows\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-content\/uploads\/2018\/01\/clip_image002_thumb.jpg\",\"datePublished\":\"2018-01-08T16:16:30+00:00\",\"dateModified\":\"2020-01-11T20:51:56+00:00\",\"author\":{\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/#\/schema\/person\/57a8972435106bac7970692fcf5edfa7\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-meltdown-and-spectre-mitigation-status-in-windows\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-meltdown-and-spectre-mitigation-status-in-windows\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-meltdown-and-spectre-mitigation-status-in-windows\/#primaryimage\",\"url\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-content\/uploads\/2018\/01\/clip_image002_thumb.jpg\",\"contentUrl\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-content\/uploads\/2018\/01\/clip_image002_thumb.jpg\",\"width\":1028,\"height\":697},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-meltdown-and-spectre-mitigation-status-in-windows\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Checking Your Meltdown and Spectre Mitigation Status in Windows\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/#website\",\"url\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/\",\"name\":\"Glenn Berry\",\"description\":\"Semi-random musings about SQL Server performance\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/#\/schema\/person\/57a8972435106bac7970692fcf5edfa7\",\"name\":\"Glenn Berry\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/64bdac8830f25f2f8cc780f8a1286c66ff1182218009271e7a953639596f7e25?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/64bdac8830f25f2f8cc780f8a1286c66ff1182218009271e7a953639596f7e25?s=96&d=mm&r=g\",\"caption\":\"Glenn Berry\"},\"sameAs\":[\"https:\/\/www.sqlskills.com\/blogs\/glenn\/\"],\"url\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/author\/glenn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Checking Your Meltdown and Spectre Mitigation Status in Windows - Glenn Berry","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-meltdown-and-spectre-mitigation-status-in-windows\/","og_locale":"en_US","og_type":"article","og_title":"Checking Your Meltdown and Spectre Mitigation Status in Windows - Glenn Berry","og_description":"As I have previously discussed, there has been an explosion of information and speculation about the Spectre and Meltdown vulnerabilities. Here is the official information about all three vulnerabilities. Spectre CVE-2017-5753 (Bounds Check Bypass) CVE-2017-5715 (Branch Target Injection) Meltdown CVE-2017-5754 (Rogue Data Cache Load) Checking Your Meltdown and Spectre Mitigation Status in Windows Microsoft has […]","og_url":"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-meltdown-and-spectre-mitigation-status-in-windows\/","og_site_name":"Glenn Berry","article_published_time":"2018-01-08T16:16:30+00:00","article_modified_time":"2020-01-11T20:51:56+00:00","og_image":[{"url":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-content\/uploads\/2018\/01\/clip_image002_thumb.jpg","type":"","width":"","height":""}],"author":"Glenn Berry","twitter_misc":{"Written by":"Glenn Berry","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-meltdown-and-spectre-mitigation-status-in-windows\/","url":"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-meltdown-and-spectre-mitigation-status-in-windows\/","name":"Checking Your Meltdown and Spectre Mitigation Status in Windows - Glenn Berry","isPartOf":{"@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-meltdown-and-spectre-mitigation-status-in-windows\/#primaryimage"},"image":{"@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-meltdown-and-spectre-mitigation-status-in-windows\/#primaryimage"},"thumbnailUrl":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-content\/uploads\/2018\/01\/clip_image002_thumb.jpg","datePublished":"2018-01-08T16:16:30+00:00","dateModified":"2020-01-11T20:51:56+00:00","author":{"@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/#\/schema\/person\/57a8972435106bac7970692fcf5edfa7"},"breadcrumb":{"@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-meltdown-and-spectre-mitigation-status-in-windows\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-meltdown-and-spectre-mitigation-status-in-windows\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-meltdown-and-spectre-mitigation-status-in-windows\/#primaryimage","url":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-content\/uploads\/2018\/01\/clip_image002_thumb.jpg","contentUrl":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-content\/uploads\/2018\/01\/clip_image002_thumb.jpg","width":1028,"height":697},{"@type":"BreadcrumbList","@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/checking-your-meltdown-and-spectre-mitigation-status-in-windows\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sqlskills.com\/blogs\/glenn\/"},{"@type":"ListItem","position":2,"name":"Checking Your Meltdown and Spectre Mitigation Status in Windows"}]},{"@type":"WebSite","@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/#website","url":"https:\/\/www.sqlskills.com\/blogs\/glenn\/","name":"Glenn Berry","description":"Semi-random musings about SQL Server performance","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sqlskills.com\/blogs\/glenn\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/#\/schema\/person\/57a8972435106bac7970692fcf5edfa7","name":"Glenn Berry","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/64bdac8830f25f2f8cc780f8a1286c66ff1182218009271e7a953639596f7e25?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/64bdac8830f25f2f8cc780f8a1286c66ff1182218009271e7a953639596f7e25?s=96&d=mm&r=g","caption":"Glenn Berry"},"sameAs":["https:\/\/www.sqlskills.com\/blogs\/glenn\/"],"url":"https:\/\/www.sqlskills.com\/blogs\/glenn\/author\/glenn\/"}]}},"_links":{"self":[{"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/posts\/1312","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/comments?post=1312"}],"version-history":[{"count":0,"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/posts\/1312\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/media?parent=1312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/categories?post=1312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/tags?post=1312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}