Skip to content

Commit a252f34

Browse files
authored
Merge pull request #204369 from cynthn/patch-612
Update virtual-machines-common-mitigate-se.md
2 parents 10e6b32 + 4660532 commit a252f34

File tree

1 file changed

+9
-2
lines changed

1 file changed

+9
-2
lines changed

includes/virtual-machines-common-mitigate-se.md

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,14 +10,16 @@
1010
ms.custom: include file
1111
---
1212

13-
This article provides guidance for a new class of silicon based micro-architectural and speculative execution side-channel vulnerabilities that affect many modern processors and operating systems. This includes Intel, AMD, and ARM. Specific details for these silicon-based vulnerabilities can be found in the following security advisories:
13+
This article provides guidance for a new class of silicon based micro-architectural and speculative execution side-channel vulnerabilities that affect many modern processors and operating systems. This includes Intel, AMD, and ARM. Specific details for these silicon-based vulnerabilities can be found in the following security advisories and CVEs:
1414
- [ADV180002 - Guidance to mitigate speculative execution side-channel vulnerabilities](https://msrc.microsoft.com/update-guide/vulnerability/ADV180002)
1515
- [ADV180012 - Microsoft Guidance for Speculative Store Bypass](https://msrc.microsoft.com/update-guide/vulnerability/ADV180012)
1616
- [ADV180013 - Microsoft Guidance for Rogue System Register Read](https://msrc.microsoft.com/update-guide/vulnerability/ADV180013)
1717
- [ADV180016 - Microsoft Guidance for Lazy FP State Restore](https://msrc.microsoft.com/update-guide/vulnerability/ADV180016)
1818
- [ADV180018 - Microsoft Guidance to mitigate L1TF variant](https://msrc.microsoft.com/update-guide/vulnerability/ADV180018)
1919
- [ADV190013 - Microsoft Guidance to mitigate Microarchitectural Data Sampling vulnerabilities](https://msrc.microsoft.com/update-guide/vulnerability/ADV190013)
2020
- [ADV220002 - Microsoft Guidance on Intel Processor MMIO Stale Data Vulnerabilities](https://msrc.microsoft.com/update-guide/vulnerability/ADV220002)
21+
- [CVE-2022-23816](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23816)
22+
- [CVE-2022-21123](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23825)
2123

2224

2325
The disclosure of these CPU vulnerabilities has resulted in questions from customers seeking more clarity.
@@ -106,6 +108,11 @@ CPU Get NumberOfCores,NumberOfLogicalProcessors /Format:List
106108

107109
If the number of logical processors is greater than physical processors (cores), then hyper-threading is enabled. If you are running a hyper-threaded VM, [contact Azure Support](https://aka.ms/MicrocodeEnablementRequest-SupportTechnical) to get hyper-threading disabled. Once hyper-threading is disabled, support will require a full VM reboot. Refer to [Core count](#core-count) to understand why your VM core count decreased.
108110

111+
### Option 3
112+
113+
For [CVE-2022-23816](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23816) and [CVE-2022-21123](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23825) (AMD CPU Branch Type Confusion), follow both **Option 1** and **Option 2** above.
114+
115+
109116

110117
### Linux
111118

@@ -151,4 +158,4 @@ When a hyper-threaded VM is created, Azure allocates 2 threads per core - these
151158

152159
## Next steps
153160

154-
For more information about how security is integrated into every aspect of Azure, see [Azure Security Documentation](../articles/security/index.yml).
161+
For more information about how security is integrated into every aspect of Azure, see [Azure Security Documentation](../articles/security/index.yml).

0 commit comments

Comments
 (0)