mirror of
https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance
synced 2025-08-22 18:17:15 +00:00
Numbering and correct MDS override value
Corrected the MDS override value to be the value that reflects disabling HT. Also fixed numbering for hypervisor section. Updates to this page might be complete...for now.
This commit is contained in:
parent
c32aed3219
commit
dba5f2689e
@ -13,10 +13,10 @@ The information and opinions contained in this document are provided "as is" and
|
|||||||
- 3.3 [Other Linux Distributions](#linux)
|
- 3.3 [Other Linux Distributions](#linux)
|
||||||
- 3.4 [MacOS](#mac)
|
- 3.4 [MacOS](#mac)
|
||||||
- 4\. [Hypervisors](#hyper)
|
- 4\. [Hypervisors](#hyper)
|
||||||
- [Citrix](#citrix)
|
- 4.1 [Citrix](#citrix)
|
||||||
- [Microsoft Hyper-V](#hyperv)
|
- 4.2 [Microsoft Hyper-V](#hyperv)
|
||||||
- [VMware](#vmware)
|
- 4.3 [VMware](#vmware)
|
||||||
- [Xen Project](#xen)
|
- 4.4 [Xen Project](#xen)
|
||||||
- 5\. [Hardware](#hard)
|
- 5\. [Hardware](#hard)
|
||||||
- 5.1 [Dell](#dell)
|
- 5.1 [Dell](#dell)
|
||||||
- 5.2 [HP](#hp)
|
- 5.2 [HP](#hp)
|
||||||
@ -69,7 +69,7 @@ Use the following variable values to enable mitigations. Registry keys may not e
|
|||||||
|
|
||||||
| Setting | Spectre, Meltdown, MDS | Spectre, Meltdown | Spectre-only |
|
| Setting | Spectre, Meltdown, MDS | Spectre, Meltdown | Spectre-only |
|
||||||
| --- | --- | --- | --- |
|
| --- | --- | --- | --- |
|
||||||
| FeatureSettingsOverride | 72 | 0 | 8 |
|
| FeatureSettingsOverride | 8264 | 0 | 8 |
|
||||||
| FeatureSettingsOverrideMask | 3 | 3 | 3 |
|
| FeatureSettingsOverrideMask | 3 | 3 | 3 |
|
||||||
| MinVmVersionForCpuBasedMitigations | "1.0" | "1.0" | "1.0" |
|
| MinVmVersionForCpuBasedMitigations | "1.0" | "1.0" | "1.0" |
|
||||||
|
|
||||||
@ -110,16 +110,18 @@ Windows operating systems and applications guidance in development:
|
|||||||
* [Apple's Spectre and Meltdown notice](https://support.apple.com/en-us/HT208394)
|
* [Apple's Spectre and Meltdown notice](https://support.apple.com/en-us/HT208394)
|
||||||
|
|
||||||
## <a name="hyper">4. Hypervisors
|
## <a name="hyper">4. Hypervisors
|
||||||
### <a name="citrix"/>Citrix
|
### <a name="citrix"/>4.1 Citrix
|
||||||
* [MDS statement](https://www.citrix.com/blogs/2019/05/14/microarchitectural-data-sampling-security-issues-and-mitigations/)
|
* [MDS statement](https://www.citrix.com/blogs/2019/05/14/microarchitectural-data-sampling-security-issues-and-mitigations/)
|
||||||
* [Spectre and Meltdown statement](https://support.citrix.com/article/CTX231399)
|
* [Spectre and Meltdown statement](https://support.citrix.com/article/CTX231399)
|
||||||
* [Performance impact guidance](https://www.citrix.com/blogs/2018/02/06/meltdown-and-spectre-understanding-the-performance-impact-current-state-whats-next/)
|
* [Performance impact guidance](https://www.citrix.com/blogs/2018/02/06/meltdown-and-spectre-understanding-the-performance-impact-current-state-whats-next/)
|
||||||
### <a name="hyperv"/>Microsoft Hyper-V
|
|
||||||
|
### <a name="hyperv"/>4.2 Microsoft Hyper-V
|
||||||
* [Side-channel vulnerability mitigations for multiple Microsoft platforms](https://support.microsoft.com/en-us/help/4457951/windows-guidance-to-protect-against-speculative-execution-side-channel)
|
* [Side-channel vulnerability mitigations for multiple Microsoft platforms](https://support.microsoft.com/en-us/help/4457951/windows-guidance-to-protect-against-speculative-execution-side-channel)
|
||||||
* [Hyper Clear mitigation](https://techcommunity.microsoft.com/t5/Virtualization/5-14-Hyper-V-HyperClear-Update/ba-p/566499)
|
* [Hyper Clear mitigation](https://techcommunity.microsoft.com/t5/Virtualization/5-14-Hyper-V-HyperClear-Update/ba-p/566499)
|
||||||
* [Configuration changes to mitigate side-channel vulnerabilities](https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/CVE-2017-5715-and-hyper-v-vms)
|
* [Configuration changes to mitigate side-channel vulnerabilities](https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/CVE-2017-5715-and-hyper-v-vms)
|
||||||
* [Server configuration changes to mitigate side-channel vulnerabilities](https://support.microsoft.com/en-us/help/4072698/windows-server-speculative-execution-side-channel-vulnerabilities-prot)
|
* [Server configuration changes to mitigate side-channel vulnerabilities](https://support.microsoft.com/en-us/help/4072698/windows-server-speculative-execution-side-channel-vulnerabilities-prot)
|
||||||
### <a name="vmware"/>VMware
|
|
||||||
|
### <a name="vmware"/>4.3 VMware
|
||||||
* [MDS advisory](https://www.vmware.com/security/advisories/VMSA-2019-0008.html)
|
* [MDS advisory](https://www.vmware.com/security/advisories/VMSA-2019-0008.html)
|
||||||
* [Hypervisor mitigations for MDS](https://kb.vmware.com/s/article/67577)
|
* [Hypervisor mitigations for MDS](https://kb.vmware.com/s/article/67577)
|
||||||
* [Guest mitigations for MDS](https://kb.vmware.com/s/article/68024)
|
* [Guest mitigations for MDS](https://kb.vmware.com/s/article/68024)
|
||||||
@ -127,7 +129,8 @@ Windows operating systems and applications guidance in development:
|
|||||||
* [Configuration changes and microcode mitigations for Spectre, Meltdown](https://kb.vmware.com/s/article/54951)
|
* [Configuration changes and microcode mitigations for Spectre, Meltdown](https://kb.vmware.com/s/article/54951)
|
||||||
* [VMware additional guidance on side-channel vulnerabilities](https://kb.vmware.com/s/article/52245)
|
* [VMware additional guidance on side-channel vulnerabilities](https://kb.vmware.com/s/article/52245)
|
||||||
* [vSphere configuration guidance](https://blogs.vmware.com/feed-items/vulnerabilities-how-to-fix-meltdown-and-spectre-on-vmware-vsphere)
|
* [vSphere configuration guidance](https://blogs.vmware.com/feed-items/vulnerabilities-how-to-fix-meltdown-and-spectre-on-vmware-vsphere)
|
||||||
### <a name="xen"/>Xen Project
|
|
||||||
|
### <a name="xen"/>4.4 Xen Project
|
||||||
* [MDS Guidance](https://www.citrix.com/blogs/2019/05/14/microarchitectural-data-sampling-security-issues-and-mitigations/)
|
* [MDS Guidance](https://www.citrix.com/blogs/2019/05/14/microarchitectural-data-sampling-security-issues-and-mitigations/)
|
||||||
* [Spectre and Meltdown administrator guidance](https://wiki.xenproject.org/wiki/Respond_to_Meltdown_and_Spectre)
|
* [Spectre and Meltdown administrator guidance](https://wiki.xenproject.org/wiki/Respond_to_Meltdown_and_Spectre)
|
||||||
* [Spectre and Meltdown Wiki FAQ](https://wiki.xenproject.org/wiki/Xen_Project_Meltdown_and_Spectre_Technical_FAQ)
|
* [Spectre and Meltdown Wiki FAQ](https://wiki.xenproject.org/wiki/Xen_Project_Meltdown_and_Spectre_Technical_FAQ)
|
||||||
|
Loading…
x
Reference in New Issue
Block a user