Prikaz jedne poruke
Stara 4.1.2018, 4:32   #441
Mickie
Deo inventara foruma
 
Član od: 22.11.2005.
Poruke: 3.399
Zahvalnice: 389
Zahvaljeno 716 puta na 542 poruka
Određen forumom Re: Intel Coffee Lake

Mislio sam da samo intel ovo pogadja, ali evo sta mi Red Hat poslao mailom:

Citat:
Red Hat Product Security has been made aware of vulnerabilities affecting modern microprocessors for all operating systems on all hardware platforms that could allow unauthorized read access to memory. This issue has been assigned CVE-2017-5753, CVE-2017-5715, and CVE-2017-5754. All currently supported versions of Red Hat Enterprise Linux, Red Hat OpenShift, Red Hat Virtualization, and Red Hat OpenStack Platform are affected.

CUSTOMER ACTION:
Customers running kernels and virtualization components in the products listed below are affected. These vulnerabilities impact many CPU architectures (e.g. Intel, ARM, AMD, POWER 8, POWER 9, and System z) and many of the operating systems that enable those architectures. A vulnerability detector and Red Hat Insights Rules have been created to assist customers in understanding their exposure. Red Hat recommends that customers running bare-metal, virtualized (host and guest), or containerized workloads apply the necessary patches (updated kernels) as soon as possible. For more details, see the Red Hat Customer Portal Vulnerability Response. Customers running Red Hat products with our Certified Cloud Provider Partners should contact the Cloud provider for further details.

VULNERABILITY DETAILS:
The speculative execution microarchitecture flaw affects many modern microprocessors which can be mitigated in the Linux kernel or in combination with updated virtualization packages and microcode update, depending on the architecture. An unprivileged attacker can use this flaw to bypass restrictions to gain read access to privileged memory that would otherwise be inaccessible.

The speculative execution microarchitecture flaw has been assigned CVE-2017-5753, CVE-2017-5715, and CVE-2017-5754 and is rated IMPORTANT by Red Hat Product Security. Accordingly, this collection of security advisories is rated IMPORTANT by Red Hat Product Security.

Note: Not all microprocessors are affected the same way. Customers should refer to the Red Hat Customer Portal Vulnerability Response and their CPU vendors to determine the full extent of impact and remediation required.

The nature of these vulnerabilities and their fixes introduces the possibility of reduced performance on patched systems. The performance impact depends on the hardware and the applications in place. Red Hat is actively working with our technology partners to reduce or eliminate these performance impacts as quickly as possible.

IMPACT:
This issue impacts the following products:
Red Hat Enterprise Linux 5
Red Hat Enterprise Linux 6
Red Hat Enterprise Linux 7
Red Hat Enterprise Linux for Real Time
Red Hat Enterprise Linux for SAP Applications
Red Hat Enterprise Linux for SAP HANA
Red Hat Enterprise Linux for SAP Solutions
Red Hat Enterprise MRG 2
Red Hat Openshift Online v2
Red Hat Openshift Online v3
Red Hat Virtualization (RHEV-H/RHV-H) 3.6
Red Hat Virtualization (RHEV-H/RHV-H) 4.1
Red Hat Enterprise MRG (realtime kernel)
Red Hat Openstack 6
Red Hat Openstack 7
Red Hat Openstack 8
Red Hat Openstack 9
Red Hat Openstack 10
Red Hat Openstack 11
Red Hat Openstack 12
Mickie je offline   Odgovor sa citatom ove poruke
Sledeći korisnik se zahvaljuje korisniku Mickie na korisnoj poruci:
Aleksandar Djurovic (4.1.2018)