InSpectre Release #7 mit CPUID veröffentlicht
Das kleine Windows-Tool InSpectre ist in der Version 7 erschienen. Es zeigt den Stand der “Linderungen” bezüglich der Angriffszenarien Spectre und Meltdown, und ist dabei erheblich übersichtlicher und komfortabler als das Powershell-Skript, das Microsoft im Januar veröffentlicht hat. Zudem kann das Tool die Gegenmaßnahmen auch an- und abschalten sofern bereits installiert und die CPU betroffen ist.
Hier das Changelog:
Release #7 — Added the display of the system’s CPUID …
Microsoft will be making Intel (and perhaps AMD?) processor microcode patches available for the most persistent Spectre Variant 2 vulnerability. These will become available over time as they become available from Intel and they will apparently need to be manually installed by interested Windows users. It is not yet clear whether Microsoft will be willing or interested in making these patches available for earlier versions of its Windows operating systems, but we can hope.The patches are applicable to specific CPU models only, which are identified by each chip’s “CPUID.” For this reason, InSpectre now prominently displays the system’s processor CPUID at the top of its system summary.
Please check this page on Microsoft’s website to see whether a microcode patch for your CPU, determined by its CPUID, is available at any time:
KB4090007: Intel microcode updates
You can also use your favorite Internet search engine to search for the string “KB4090007” which should always take to that page and to its related Microsoft Update Catalog page to obtain the specific Windows update.
Download: InSpectre Release 7 [Windows]
Links zum Thema:
- Klagen gegen AMD wegen Sicherheitslücke Spectre ()
- Spectre Firmware-Updates: Mainboard-Hersteller warten auf AMD ()
- AMD gibt Programmierleitfaden gegen Spectre heraus ()
- Bootfehler nach Windows-Update auch bei neuen Systemen ()
- Massive Sicherheitslücke in Intel-CPUs (Update: AMD, ARM, Bugfixes) ()