On 18Jan04:1754+0000, David L. Craig wrote:
>
> According to this article published by Red Hat, you cannot.
>
> : Red Hat has been made aware of multiple microarchitectural
> : (hardware) implementation issues affecting many modern
> : microprocessors, requiring updates to the Linux kernel,
> : virtualization-related components, and/or in combination
> : with a microcode update.  An unprivileged attacker can use
> : these flaws to bypass conventional memory security
> : restrictions in order to gain read access to privileged
> : memory that would otherwise be inaccessible. There are 3
> : known CVEs related to this issue in combination with Intel,
> : AMD, and ARM architectures. Additional exploits for other
> : architectures are also known to exist. These include IBM
> : System Z,  POWER8 (Big Endian and Little Endian), and
> : POWER9 (Little Endian).
>
> https://access.redhat.com/security/vulnerabilities/speculativeexecution?sc_cid=7016000000127NJAAY

They have also published clear updates for Z kernel components:

https://access.redhat.com/errata/RHSA-2018:0011
--
<not cent from sell>
May the LORD God bless you exceedingly abundantly!

Dave_Craig______________________________________________
"So the universe is not quite as you thought it was.
 You'd better rearrange your beliefs, then.
 Because you certainly can't rearrange the universe."
__--from_Nightfall_by_Asimov/Silverberg_________________

----------------------------------------------------------------------
For LINUX-390 subscribe / signoff / archive access instructions,
send email to lists...@vm.marist.edu with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390
----------------------------------------------------------------------
For more information on Linux on System z, visit
http://wiki.linuxvm.org/

Reply via email to