Applying this update will enable the Spectre Variant 2 mitigation CVE-2017-5715 - “Branch target injection vulnerability.”
Advanced users can also manually enable mitigation against Spectre, Variant 2 through the registry settings documented in the following articles:
Windows Client Guidance for IT Pros to protect against speculative execution side-channel vulnerabilities
Windows Server Guidance to protect against speculative execution side-channel vulnerabilities
To learn more about Spectre Variant 2, go to the following Security Advisory:
Consult with your device manufacturer’s and Intel’s websites regarding their microcode recommendation for your device before applying this update to your device.
How to get this update
To get the stand-alone package for this update, go to the Microsoft Update Catalog website.
Known issues in this update
Microsoft is not aware of any issues that affect this update currently.
There are no prerequisites to apply this update.
To apply this update, you don't have to make any changes to the registry.
You must restart the computer after you apply this update.
Update replacement information
This update does not replace a previously released update.
The third-party products that this article discusses are manufactured by companies that are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about the performance or reliability of these products.