<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Speculative Store Bypass (Variant 4) in Servers - General</title>
    <link>https://community.hpe.com/t5/servers-general/speculative-store-bypass-variant-4/m-p/7007202#M8858</link>
    <description>&lt;P&gt;A new industry-wide vulnerability, identified as the Speculative Store Bypass or Variant 4 vulnerability, has recently been disclosed and is impacting microprocessor architectures from multiple CPU vendors including Intel and AMD. To address this vulnerability, hardware and software vendors from across the industry, including HPE, have been working together to develop mitigation strategies.&amp;nbsp; As HPE teams continue to investigate this new vulnerability, information including products affected and mitigation information including OS and System ROM updates will be updated on the &lt;A href="https://h22208.www2.hpe.com/eginfolib/securityalerts/Variant/Variant_Vulnerabilities.html" target="_blank"&gt;HPE Security Vulnerability page&lt;/A&gt;. Visit the page today for current information and check back as new updates are made. &lt;A href="https://h41360.www4.hpe.com/alerts-signup.php?jumpid=hpsc_secbulletins" target="_blank"&gt;Sign up for HPE Security Alerts&lt;/A&gt; to receive notifications and updates in your inbox.&lt;/P&gt;</description>
    <pubDate>Mon, 28 May 2018 05:50:31 GMT</pubDate>
    <dc:creator>Vajith V</dc:creator>
    <dc:date>2018-05-28T05:50:31Z</dc:date>
    <item>
      <title>Speculative Store Bypass (Variant 4)</title>
      <link>https://community.hpe.com/t5/servers-general/speculative-store-bypass-variant-4/m-p/7007202#M8858</link>
      <description>&lt;P&gt;A new industry-wide vulnerability, identified as the Speculative Store Bypass or Variant 4 vulnerability, has recently been disclosed and is impacting microprocessor architectures from multiple CPU vendors including Intel and AMD. To address this vulnerability, hardware and software vendors from across the industry, including HPE, have been working together to develop mitigation strategies.&amp;nbsp; As HPE teams continue to investigate this new vulnerability, information including products affected and mitigation information including OS and System ROM updates will be updated on the &lt;A href="https://h22208.www2.hpe.com/eginfolib/securityalerts/Variant/Variant_Vulnerabilities.html" target="_blank"&gt;HPE Security Vulnerability page&lt;/A&gt;. Visit the page today for current information and check back as new updates are made. &lt;A href="https://h41360.www4.hpe.com/alerts-signup.php?jumpid=hpsc_secbulletins" target="_blank"&gt;Sign up for HPE Security Alerts&lt;/A&gt; to receive notifications and updates in your inbox.&lt;/P&gt;</description>
      <pubDate>Mon, 28 May 2018 05:50:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/servers-general/speculative-store-bypass-variant-4/m-p/7007202#M8858</guid>
      <dc:creator>Vajith V</dc:creator>
      <dc:date>2018-05-28T05:50:31Z</dc:date>
    </item>
  </channel>
</rss>

