VMware vSphere

 View Only
  • 1.  Downfall vulnerability CVE-2022-40982

    Posted Aug 10, 2023 07:24 AM


  • 2.  RE: Downfall vulnerability CVE-2022-40982

    Posted Aug 10, 2023 10:56 AM

    It's up to the vendor to build, test and release the microcode updates for the CPUs. That being said, this isn't as bad as spectre or meltdown.

    The vulnerability is mainly in the AVX instruction set, which is used primarily in HPC workloads from what I understand. So unless you're using those specific instruction sets, it shouldn't be that bad.



  • 3.  RE: Downfall vulnerability CVE-2022-40982

    Posted Aug 10, 2023 11:19 AM
    Sounds more like a question for a HPE forum…


  • 4.  RE: Downfall vulnerability CVE-2022-40982

    Posted Aug 10, 2023 12:32 PM

    It is not only question for vendor because, for example:

    Citrix has released hotfix to solve this issue by updating Intel microcode version to IPU 2023.3 :
    https://support.citrix.com/article/CTX570473/hotfix-xs82ecu1045-for-citrix-hypervisor-82-cumulative-update-1

    XEN has released advisory where is described mitigation for whole hypervisor or for specic untrusted VMs.
    http://xenbits.xen.org/xsa/advisory-435.html



  • 5.  RE: Downfall vulnerability CVE-2022-40982

    Posted Aug 15, 2023 09:23 AM

    As far as I understand the available information the Guest OS is not affected. Is it correct that only the hypervisor could be affected?

     

    Thanks in advance!

    Regards

    Christian