rssLink RSS for all categories
 
icon_blue
icon_green
icon_green
icon_red
icon_red
icon_green
icon_green
icon_orange
icon_red
icon_red
icon_green
icon_green
icon_green
icon_red
icon_green
icon_red
icon_green
icon_green
icon_red
icon_red
icon_green
icon_red
icon_green
icon_green
icon_orange
icon_green
icon_orange
icon_blue
icon_green
icon_blue
icon_red
icon_green
 

FS#38471 — Intel MDS Vulnerabilities mitigation

Attached to Project— Serveurs dédiés
Maintenance
ALL
CLOSED
100%
Regarding the different CVE publicized

● CVE-2018-12126 [microarchitectural store buffer data sampling (MSBDS)]
● CVE-2018-12130 [microarchitectural fill buffer data sampling (MFBDS)]
● CVE-2018-12127 [microarchitectural load port data sampling (MLPDS)]
● CVE-2019-11091 [microarchitectural data sampling uncacheable memory (MDSUM)]

On Dedicated Servers, customer operations ARE REQUIRED in order to mitigate the flaw.
Your system need to be updated as soon as your operating system editor will have published the patch.

If you are running an OVH Kernel, you can simply enable the 'Netboot' feature and reboot your system (https://docs.ovh.com/gb/en/dedicated/kernel-netboot/#boot-from-network-mode)

The deployment of the up-to-date Intel microcode is automatic for the UEFI boot mode.
Date:  Wednesday, 15 May 2019, 18:18PM
Reason for closing:  Done