Red Hat urges Intel processor users marked ZombieLoad v2 security patches as soon as possible

Softpedia foreign media reports, Red Hat (RedHat) reported yesterday a series of new security vulnerability affects Intel CPU microarchitecture to the outside world, but they have been patched in the new version of the Linux kernel, it is recommended to update affected customers as soon as possible.

It is reported that three vulnerabilities were CVE-2018-12207 (page size change machine check error), CVE-2019-11135 (TSX asynchronous abort), as well as CVE-2019-0155 and CVE-2019-0154 (i915 Display Driver related vulnerabilities).

red-hat-responds-to-zombieload-v2-security-vulnerabilities-affecting-intel-cpus-528146-2.jpg

(Title figure Via  Softpedia )

Red Hat security team these vulnerabilities marked as important that they have security have been affected. The attacker if they are to succeed, the system will open its read access to the sensitive data, spread all supported Red Hat Enterprise Linux (RedHat Enterprise) Linux operating system .

Red Hat aware of a micro-architecture (hardware) implementation of vulnerability, the problem may lead to an unprivileged local attacker to bypass the conventional system security mechanisms, such as denial of service condition caused by system-wide.

The only known vulnerability affects Intel's processors, but the flaws in the hardware level, requiring the implementation of kernel-level repair update. This problem affects Red Hat Enterprise Linux 8 and all earlier releases.

Although Red Hat believes its own configuration is not much problem, we recommend that affected customers patched the first time.

Given today has released a security breach can alleviate the Intel CPU new Linux kernel version, for other GNU / Linux distributions by the user's favorite, will soon push the stable version of the software repository.

Guess you like

Origin www.oschina.net/news/111319/red-hat-responds-to-zombieload-v2