[Beowulf] RHEL7 kernel update for L1TF vulnerability breaks RDMA
Jörg Saßmannshausen
sassy-work at sassy.formativ.net
Sat Aug 18 06:55:22 PDT 2018
Hi Chris,
unless there is something I miss but I read about that in 'Der Spiegel Online'
on Wednesday
http://www.spiegel.de/netzwelt/gadgets/foreshadow-neue-angriffsmethode-trifft-intel-chips-und-cloud-dienste-a-1223289.html
and the link was to this page here:
https://foreshadowattack.eu/
So I don't really understand about "Cannot make this public, as the patch that
caused it was due to embargo'd security fix." issue. The problem is known and I
also noticed that Debian issued some Intel microcode patches which raised my
awareness about a potential problem again.
Sorry, maybe I miss out something here.
All the best
Jörg
Am Samstag, 18. August 2018, 21:56:52 BST schrieb Chris Samuel:
> On 18/8/18 8:47 pm, Jörg Saßmannshausen wrote:
> > Hi Chris,
>
> Hiya,
>
> > these are bad news if InfiniBand will be affected here as well as
> > that is what we need to use for parallel calculations. They make use
> > of RMDA and if that has a problem..... well, you get the idea I
> > guess.
>
> Oh yes, this is why I wanted to bring it to everyones attention, this
> isn't just about Lustre, it's much more widespread.
>
> > Has anybody contacted the vendors like Mellanox or Intel regarding
> > this?
>
> As Kilian wrote in the Lustre bug quoting his RHEL bug:
>
> https://bugzilla.redhat.com/show_bug.cgi?id=1618452
>
> — Comment #3 from Don Dutile <ddutile at redhat.com> —
> Already reported and being actively fixed.
>
> Cannot make this public, as the patch that caused it was due to
> embargo'd
> security fix.
>
> This issue has highest priority for resolution.
> Revert to 3.10.0-862.11.5.el7 in the mean time.
>
> This bug has been marked as a duplicate of bug 1616346
More information about the Beowulf
mailing list