Skip to content

Commit 8777692

Browse files
authored
Merge pull request #95414 from cynthn/11-8-mitigate
Mitigate SE for Nov 2019
2 parents 4f2a8f0 + 1ef0300 commit 8777692

File tree

4 files changed

+11
-12
lines changed

4 files changed

+11
-12
lines changed

articles/cloud-services/mitigate-se.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.service: cloud-services
1212
ms.workload: infrastructure-services
1313
ms.tgt_pltfrm: vm-windows
1414
ms.topic: article
15-
ms.date: 05/21/2018
15+
ms.date: 11/12/2019
1616
ms.author: cynthn
1717
---
1818

articles/virtual-machines/linux/mitigate-se.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: infrastructure-services
1414
ms.tgt_pltfrm: vm-linux
1515

1616
ms.topic: article
17-
ms.date: 08/08/2019
17+
ms.date: 11/12/2019
1818
ms.author: cynthn
1919

2020
---

articles/virtual-machines/windows/mitigate-se.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: infrastructure-services
1414
ms.tgt_pltfrm: vm-windows
1515

1616
ms.topic: article
17-
ms.date: 08/08/2019
17+
ms.date: 11/12/2019
1818
ms.author: cynthn
1919

2020
---

includes/virtual-machines-common-mitigate-se.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@
55
author: cynthn
66
ms.service: virtual-machines
77
ms.topic: include
8-
ms.date: 08/08/2019
8+
ms.date: 11/12/2019
99
ms.author: cynthn;kareni
1010
ms.custom: include file
1111
---
1212

1313

14-
**Last document update**: 9 August 2019 10:00 AM PST.
14+
**Last document update**: 12 November 2019 10:00 AM PST.
1515

1616
The disclosure of a [new class of CPU vulnerabilities](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002) known as speculative execution side-channel attacks has resulted in questions from customers seeking more clarity.
1717

@@ -24,17 +24,12 @@ More information about how security is integrated into every aspect of Azure is
2424
> [!NOTE]
2525
> Since this document was first published, multiple variants of this vulnerability class have been disclosed. Microsoft continues to be heavily invested in protecting our customers and providing guidance. This page will be updated as we continue to release further fixes.
2626
>
27-
> On May 14, 2019, [Intel disclosed](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html) a new set of speculative execution side channel vulnerability known as Microarchitectural Data Sampling (MDS see the Microsoft Security Guidance [ADV190013](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190013)), which has been assigned multiple CVEs:
28-
> - CVE-2019-11091 - Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
29-
> - CVE-2018-12126 - Microarchitectural Store Buffer Data Sampling (MSBDS) 
30-
> - CVE-2018-12127 - Microarchitectural Load Port Data Sampling (MLPDS)
31-
> - CVE-2018-12130 - Microarchitectural Fill Buffer Data Sampling (MFBDS)
32-
>
33-
> This vulnerability affects Intel® Core® processors and Intel® Xeon® processors. Microsoft Azure has released operating system updates and is deploying new microcode, as it is made available by Intel, throughout our fleet to protect our customers against these new vulnerabilities. Azure is closely working with Intel to test and validate the new microcode prior to its official release on the platform.
27+
> On November 12, 2019, [Intel published](https://software.intel.com/security-software-guidance/insights/deep-dive-intel-transactional-synchronization-extensions-intel-tsx-asynchronous-abort) a technical advisory around Intel® Transactional Synchronization Extensions (Intel® TSX) Transaction Asynchronous Abort (TAA) vulnerability that is assigned [CVE-2019-11135](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-11135). This vulnerability affects Intel® Core® processors and Intel® Xeon® processors. Microsoft Azure has released operating system updates and is deploying new microcode, as it is made available by Intel, throughout our fleet to protect our customers against these new vulnerabilities. Azure is closely working with Intel to test and validate the new microcode prior to its official release on the platform.
3428
>
3529
> **Customers that are running untrusted code within their VM** need to take action to protect against these vulnerabilities by reading below for additional guidance on all speculative execution side-channel vulnerabilities (Microsoft Advisories ADV [180002](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002), [180018](https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv180018), and [190013](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190013)).
3630
>
3731
> Other customers should evaluate these vulnerabilities from a Defense in Depth perspective and consider the security and performance implications of their chosen configuration.
32+
>
3833
3934

4035

@@ -99,6 +94,7 @@ Windows OS support for kernel VA shadow is enabled: True
9994
Windows OS support for speculative store bypass disable is enabled system-wide: False
10095
Windows OS support for L1 terminal fault mitigation is enabled: True
10196
Windows OS support for MDS mitigation is enabled: True
97+
Windows OS support for TAA mitigation is enabled: True
10298
```
10399

104100
If the output shows `MDS mitigation is enabled: False`, please [contact Azure Support](https://aka.ms/MicrocodeEnablementRequest-SupportTechnical) for available mitigation options.
@@ -177,6 +173,9 @@ This article provides guidance to the below speculative execution side-channel a
177173
- CVE-2018-12127 - Microarchitectural Load Port Data Sampling (MLPDS)
178174
- CVE-2018-12130 - Microarchitectural Fill Buffer Data Sampling (MFBDS)
179175

176+
Transactional Synchronization Extensions (Intel® TSX) Transaction Asynchronous Abort:
177+
- [CVE-2019-11135](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-11135) – TSX Transaction Asynchronous Abort (TAA)
178+
180179

181180

182181

0 commit comments

Comments
 (0)