• About
  • Advertise
  • Careers
  • Contact
  • About
Wednesday, May 14, 2025
No Result
View All Result
NEWSLETTER
iotarizona
  • Home
  • Tech
  • IoT
  • Development
  • Enterprise
  • Data & Analytics
  • Smart Cities
  • AI
  • IIoT
  • Manufacturing
  • Connected Cars
  • Home
  • Tech
  • IoT
  • Development
  • Enterprise
  • Data & Analytics
  • Smart Cities
  • AI
  • IIoT
  • Manufacturing
  • Connected Cars
No Result
View All Result
iotarizona
No Result
View All Result
Home Tech

4 vulnerabilities and exposures affect Intel-based systems; Red Hat responds

in Tech
4 vulnerabilities and exposures affect Intel-based systems; Red Hat responds
0
SHARES
37
VIEWS
Share on FacebookShare on Twitter

Four vulnerabilities were publicly disclosed related to Intel microprocessors. These vulnerabilities allow unprivileged attackers to bypass restrictions to gain read access to privileged memory. They include these common vulnerabilities and exposures (CVEs):

  • CVE-2018-12126 – a flaw that could lead to information disclosure from the processor store buffer
  • CVE-2018-12127 – an exploit of the microprocessor load operations that can provide data to an attacker about CPU registers and operations in the CPU pipeline
  • CVE-2018-12130 – the most serious of the three issues and involved the implementation of the microprocessor fill buffers and can expose data within that buffer
  • CVE-2019-11091 – a flaw in the implementation of the “fill buffer,” a mechanism used by modern CPUs when a cache-miss is made on L1 CPU cache
[ Also read: Linux hardening: a 15-step checklist for a secure Linux server ]

Red Hat customers should update their systems

Security updates will degrade system performance, but Red Hat strongly suggests that customers update their systems whether or not they believe themselves to be at risk.

Red Hat versions affected include:

  • Red Hat Enterprise Linux 5
  • Red Hat Enterprise Linux 6
  • Red Hat Enterprise Linux 7
  • Red Hat Enterprise Linux 8
  • Red Hat Atomic Host
  • Red Hat Enterprise MRG 2
  • Red Hat OpenShift Online v2
  • Red Hat OpenShift Online v3
  • Red Hat Virtualization (RHV/RHV-H)
  • Red Hat OpenStack Platform

For Red Hat, vulnerability information is available at this Red Hat vulnerabilities site.

It is important to understand that an attacker cannot use this vulnerability to target specific data. Attacks would likely require sampling over a period of time, along with the application of statistical methods to reconstruct data that might be of value to them.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Download Premium WordPress Themes Free
Free Download WordPress Themes
Download WordPress Themes Free
Download WordPress Themes
udemy paid course free download
download samsung firmware
Free Download WordPress Themes
download udemy paid course for free
Tags: Related: Linux Security
ADVERTISEMENT
Next Post

The future of factories in an IoT-driven world: Budget and data challenges and opportunities

Recommended

Gartner: IT spending to drop due to falling equipment prices

Gartner: IT spending to drop due to falling equipment prices

Somehow, AWS and cloud growth continues to accelerate

Somehow, AWS and cloud growth continues to accelerate

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • AI
  • Analysis
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Development
  • Enterprise
  • Healthcare
  • IIoT
  • IoT
  • Manufacturing
  • News
  • Oil & Gas
  • Security
  • Smart Cities
  • Smart Homes
  • Standards
  • Tech
  • Uncategorized
  • Wearables

About Us

Advance IOT information site of Arizona, USA.

© 2019-24 iotarizona.com.

No Result
View All Result
  • Home
  • Tech
  • IoT
  • Development
  • Enterprise
  • Data & Analytics
  • Smart Cities
  • AI
  • IIoT
  • Manufacturing
  • Connected Cars

© 2019-24 iotarizona.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In