Browsing Posts in Design

Reading Time: 2 minutesNow that Meltdown and Spectre vulnerabilities are almost fixed, there is a new critical vulnerabilities, this time specific only for several AMD CPU. There are 13 critical security vulnerabilities and manufacturer backdoors discovered throughout AMD Ryzen & EPYC product lines. Yes, also the lates AMD CPU models! Like with Meltdown and Spectre, there is a dedicated web site (amdflaws.com) that provide more detail about them.

Reading Time: 3 minutesAltaro è un’azienda con un’interessante soluzione di backup specifica per ambienti virtuali VMware vSphere o Microsofto Hyper-V, caratterizzata da un basso costo (adatta soprattutto a realtà PMI). Dopo un lungo periodo di beta, con numerose build, ora è disponibile la nuova versione 7.6.4 di Altaro VM Backup.

Reading Time: 3 minutesVMware la rilasciato (ancora il 15 febbraio) una nuova versione della vCSA version: vCenter Server 6.5 U1f, che porta il build number a 7801515. In questa nuova versione della vCSA viene aggiornato il Photon contro due delle vulnerabilità relative alle problematiche Meltdown e Spectre. La nuova patch vCenter Server 6.5 U1f risolve le problematiche bounds-check bypass(Spectre-1, CVE-2017-5753) e rogue data cache load (Meltdown, CVE-2017-5754). Per la vulnerabilità branch target injection (Spectre-2, CVE-2017-5715) non c’è invece ancora nessuna patch. VMware ha aggiornato il documento VMSA-2018-0007, ma non ancora il VMSA-2018-0004.2 che riporta come ultima versione del vCenter il 6.5 is still 6.5U1e!

Reading Time: 2 minutesWe are still far from a solution for the Meltdown and Spectre, considering the delay of the microcode releases and the complexity of the possible Spectre fixes… And now, some security researchers from NVIDIA and Princeton have discovered new variants of the Meltdown and Spectre flaws that may be more difficult to be fixed (but also to be exploited) than the originals.

Reading Time: 6 minutesThe mitigations for Meltdown and Spectre issues have involved a combination of different type of fixes: some software based, such as Microsoft and Linux versions of the “kernel page table isolation” protection, but also fome hardware based, like the Intel’s microcode updates (part that is still missing in most cases). Both type of patches can cause performance overheads and have some kind of impact on your environment. But how can you estimate it (before apply the patches) and how can you measure it (when the patches have been applied)?

Reading Time: 8 minutesIn June 2017, a team constituted of independent researchers, university research labs, and some of Google’s Project Zero members and cyberus technology discovered two security vulnerabilities enabled by the widespread use of speculative execution in most of the CPU. The problem was also independently discovered by other researchers, at about the same time. These vulnerabilities, called Meltdown and Spectre, were made public in January 2018. Meltdown and Spectre are critical vulnerabilities existing in several modern CPU: these hardware bugs allow programs to steal data which is currently processed on the computer. Meltdown and Spectre can affect personal […]

Reading Time: 5 minutesLinux Kernel 4.15 è stato rilasciato il 28 gennaio 2018, dopo un lungo ciclo di sviluppo, tanto da arrivare alla RC9, cosa che non succedeva dal 2011. Questa versione è la prima che contiene specifiche ottimizzazioni e soluzioni specifiche per Meltdown e Spectre issues (benché anche alcuni kernel precedenti avessero alcune protezioni). Notare che in realtà i problemi sono tre problemi distinti: Meltdown è uno, ma poi ci sono due varianti di Spectre (note come v1 e v2). Il Kernel 4.15 al momento manca ancora mancano ancora dei fix per ARM e per la variante 1 […]

© 2025-2011 vInfrastructure Blog | Disclaimer & Copyright