[j-nsp] [c-nsp] Meltdown and Spectre

Tomasz Mikołajek tmikolajek at gmail.com
Sat Jan 6 13:53:57 EST 2018


Hello.
Info from Juniper:
https://forums.juniper.net/t5/Security-Now/Meltdown-amp-Spectre-Modern-CPU-vulnerabilities/ba-p/317254#

W dniu sob., 6.01.2018 o 19:51 Sebastian Becker <sb at lab.dtag.de> napisał(a):

> Same here. User that have access are implicit trusted. So no need for
> panic.
>
>> Sebastian Becker
> sb at lab.dtag.de
>
> > Am 06.01.2018 um 12:58 schrieb Gert Doering <gert at greenie.muc.de>:
> >
> > Hi,
> >
> > On Sat, Jan 06, 2018 at 12:04:22PM +0100, james list wrote:
> >> For cve related to Meltdown and Spectre I'm wondering to know what are
> you
> >> doing or going to do on your networking gears?
> >
> > "Nothing"...
> >
> > My networking gear does not execute external code (like, JavaScript),
> > so the question "will untrusted external code be able to read secrets
> > it should not see" is not overly relevant.
> >
> >
> > Now, for those newfangled stuff where vendors think that you MUST HAVE
> > VIRTUALIZATION! on the control plane, so YOU CAN RUN STUFF THERE!!! -
> > we do not have any of those (yet), but if we had, we'd ask them for
> > hypervisor patches...
> >
> > gert
> >
> >
> > --
> > now what should I write here...
> >
> > Gert Doering - Munich, Germany
> gert at greenie.muc.de
> > _______________________________________________
> > juniper-nsp mailing list juniper-nsp at puck.nether.net
> > https://puck.nether.net/mailman/listinfo/juniper-nsp
>
> _______________________________________________
> juniper-nsp mailing list juniper-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/juniper-nsp


More information about the juniper-nsp mailing list