Browsing Posts in vSecurity

Reading Time: 6 minutes The mitigations for Meltdown and Spectre issues have involved a combination of different type of fixes: some software based, such as Microsoft and Linux versions of the “kernel page table isolation” protection, but also fome hardware based, like the Intel’s microcode updates (part that is still missing in most cases). Both type of patches can cause performance overheads and have some kind of impact on your environment. But how can you estimate it (before apply the patches) and how can you measure it (when the patches have been applied)?

Reading Time: 8 minutes In June 2017, a team constituted of independent researchers, university research labs, and some of Google’s Project Zero members and cyberus technology discovered two security vulnerabilities enabled by the widespread use of speculative execution in most of the CPU. The problem was also independently discovered by other researchers, at about the same time. These vulnerabilities, called Meltdown and Spectre, were made public in January 2018. Meltdown and Spectre are critical vulnerabilities existing in several modern CPU: these hardware bugs allow programs to steal data which is currently processed on the computer. Meltdown and Spectre can affect personal […]

Reading Time: 5 minutes Linux Kernel 4.15 has been released on 28 Jan 2018 and, thanks to the entire Linux Kernel development team, this release contains the latest code to deal with Meltdown and Spectre issues and minize the related risks. The Kernel is the core code in the operating system managing low level tasks. In the update both vulnerabilities are explicitly addressed.And the interesting aspect is that the performance are not so bad! There are infact three instinct vulnerabilities identified, one Meltdown and two variations of Spectre (known as v1 and v2). Kernel 4.15 actually address only Meltdown and […]

Reading Time: 5 minutes Meltdown and Spectre are critical vulnerabilities existing in several modern CPU: these hardware bugs allow programs to steal data which is currently processed on the computer. Meltdown and Spectre can affect personal computers, mobile devices, server and several cloud services. There isn’t a single simple way to minimize those security risks, because you need to patch different levels of your stack. For a VMware environment, there are some tools to check your status (and also to help you to apply the right patches).

Reading Time: 6 minutes Meltdown and Spectre are critical vulnerabilities existing in several modern CPU: these hardware bugs allow programs to steal data which is currently processed on the computer. Meltdown and Spectre can affect personal computers, mobile devices, server and several cloud services. Actually, the only way to minimize those security risks is to patch your operating systems or the hypervisor level (if you are using virtual machines).

Reading Time: 6 minutes VMware has released a new version of NSX-v, the NSX edition for vSphere environment. Note that NSX 6.4 is a new minor release, but has so many important enhancements, new features, and improvements that can be considered a new major release. The most interesting news are the support to the HTML5 vSphere Client (another little step to a complete adoption) and some new interesting features and capabilità in the distributed firewall. For more technical details on the new features, see this post.

Reading Time: 5 minutes Meltdown and Spectre are critical vulnerabilities existing in several modern CPU: these hardware bugs allow programs to steal data which is currently processed on the computer. Meltdown and Spectre can affect personal computers, mobile devices, server and several cloud services. Actually, the only way to minimize those security risks is to patch your operating systems and the hypervisor level (if you are using virtual machines).

© 2024-2011 vInfrastructure Blog | Disclaimer & Copyright