-
×InformationNeed Windows 11 help?Check documents on compatibility, FAQs, upgrade information and available fixes.
Windows 11 Support Center. -
-
×InformationNeed Windows 11 help?Check documents on compatibility, FAQs, upgrade information and available fixes.
Windows 11 Support Center. -
- HP Community
- Desktops
- Desktop Operating Systems and Recovery
- kernel VA shadow is present is False even after updating all...

Create an account on the HP Community to personalize your profile and ask a question
01-11-2018 04:54 AM - edited 01-11-2018 06:43 AM
This is regarding the Meltdown/Spectre Vulnerbailities
I have updated the required Windows 7 2018-01 Motnhly rollup & Bios Update in the HP Prodesk 400 G2
after updating I have used the Microsoft Powershell script(SpeculationControlSettings) to check the Status of the PC if it is secured or not. To my uderstanding the MS has mentioned that all the values to be true, but iam getting the below two options as false
Windows OS support for kernel VA shadow is present: False
Windows OS support for kernel VA shadow is enabled: False
So I would like to know that is this HP PC is secured or not, or should i need to disable or enable any options?
I have noticed that this Kernel shadow value is false in all 32bit OS.
Solved! Go to Solution.
Accepted Solutions
01-14-2018 04:46 AM
Hi,
I found that Microsoft has posted that the PC's with x86 are not protected, find the below article
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
7. I have an x86 architecture and the PowerShell Verification output indicates that I am not fully protected from these speculative execution side-channel vulnerabilities. Will Microsoft provide complete protections in the future?
Addressing a hardware vulnerability with a software update presents significant challenges and mitigations for older operating systems that require extensive architectural changes. The existing 32 bit update packages listed in this advisory fully address CVE-2017-5753 and CVE-2017-5715, but do not provide protections for CVE-2017-5754 at this time. Microsoft is continuing to work with affected chip manufacturers and investigate the best way to provide mitigations for x86 customers, which may be provided in a future update.
Thanks..
01-14-2018 04:46 AM
Hi,
I found that Microsoft has posted that the PC's with x86 are not protected, find the below article
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
7. I have an x86 architecture and the PowerShell Verification output indicates that I am not fully protected from these speculative execution side-channel vulnerabilities. Will Microsoft provide complete protections in the future?
Addressing a hardware vulnerability with a software update presents significant challenges and mitigations for older operating systems that require extensive architectural changes. The existing 32 bit update packages listed in this advisory fully address CVE-2017-5753 and CVE-2017-5715, but do not provide protections for CVE-2017-5754 at this time. Microsoft is continuing to work with affected chip manufacturers and investigate the best way to provide mitigations for x86 customers, which may be provided in a future update.
Thanks..