[ovirt-users] Re: CVE-2018-3639 - Important - oVirt - Speculative Store Bypass

2018-05-25 Thread Sandro Bonazzola
2018-05-23 16:57 GMT+02:00 Sandro Bonazzola : > As you may have already heard, an industry-wide issue was found in the way > many modern microprocessor designs have implemented speculative execution > of Load & Store instructions. > This issue is well described by

[ovirt-users] Re: CVE-2018-3639 - Important - oVirt - Speculative Store Bypass

2018-05-24 Thread Gianluca Cecchi
On Thu, May 24, 2018 at 10:08 AM, Michal Skrivanek < michal.skriva...@redhat.com> wrote: [snip] > > > > Intel has been promising microcode updates since January when Spectre > first appeared and yet except for the very newest CPUs we haven't seen > anything and in the cases of older CPUs, I

[ovirt-users] Re: CVE-2018-3639 - Important - oVirt - Speculative Store Bypass

2018-05-24 Thread Michal Skrivanek
> On 23 May 2018, at 18:45, WK wrote: > > > > On 5/23/2018 7:57 AM, Sandro Bonazzola wrote: >> >> >> Please note that to fully mitigate this vulnerability, system administrators >> must apply both hardware “microcode” updates and software patches that >> enable new

[ovirt-users] Re: CVE-2018-3639 - Important - oVirt - Speculative Store Bypass

2018-05-24 Thread Sandro Bonazzola
2018-05-23 18:45 GMT+02:00 WK : > > > On 5/23/2018 7:57 AM, Sandro Bonazzola wrote: > >> >> >> Please note that to fully mitigate this vulnerability, system >> administrators must apply both hardware “microcode” updates and software >> patches that enable new functionality. >>

[ovirt-users] Re: CVE-2018-3639 - Important - oVirt - Speculative Store Bypass

2018-05-23 Thread WK
On 5/23/2018 7:57 AM, Sandro Bonazzola wrote: Please note that to fully mitigate this vulnerability, system administrators must apply both hardware “microcode” updates and software patches that enable new functionality. At this time, microprocessor microcode will be delivered by the