More Microsoft Meltdown, Spectre Patches

Thursday, March 15, 2018 @ 05:03 PM gHale

Microsoft released patches this week for Meltdown and Spectre hardware bugs for Windows 7, Windows 8.1, and Windows 10.

Microsoft previously released updates that included Intel microcode patches for Spectre 2 vulnerabilities only for Windows 10 Fall Creators Update systems powered by Skylake chips.

Microsoft Releases Spectre Fixes
ICS Spectre, Meltdown Update Part IV
Intel Issues More Spectre Microcode Updates
VMware has Meltdown, Spectre Fixes

With the March Patch Tuesday, Microsoft expanded security updates to Kaby Lake and Coffee Lake processors as well, so now the latest-generation Intel chips are all being patched on Windows 10. Only the latest version of the operating system (currently Fall Creators Update – version 1709) is getting them.

“We will continue to broaden the number of Intel microcode updates available via the catalog as they become available to Microsoft from Intel,” Microsoft said.

Click here for the full list of processors being patched against the hardware vulnerabilities.

In addition to Windows 10, Windows 7 and Windows 8.1 are also getting new Meltdown and Spectre mitigations.

“We are also adding to the breadth of Windows updates to help protect against these vulnerabilities. Today, we are adding software coverage for the Meltdown vulnerability for x86 editions of Windows 7 and Windows 8.1 and we continue to work to provide updates for additional supported versions of Windows,” Microsoft said.

Microsoft said even more updates will be shipped in the coming months on Patch Tuesday rollouts. The software giant also said no attacks leveraging Meltdown and Spectre vulnerabilities have been recorded so far. This means not only have most users have already patched their systems, but also exploiting the processor vulnerabilities is not as easy as some people think.

Users are recommended to install the updates as soon as possible, and all patches are available via Windows Update right now.

Leave a Reply

You must be logged in to post a comment.