Meltdown and Spectre Vulnerability Statement

As some may be aware, Intel recently disclosed information relating to Meltdown and Spectre vulnerability on Jan 3, 2017. Variant 1 (CVE-2017-5753, Spectre): Bounds check bypass, Variant 2 (CVE-2017-5715, also Spectre): Branch target injection, and Variant 3 (CVE-2017-5754, Meltdown): Rogue data cache load, memory access permission check performed after kernel memory read.

Regarding the INSIGHT DLP Appliances, it appears that all customers are affected by these vulnerabilities. Currently there is a software fix available for Meltdown via Redhat/CentOS which has been tested and validated in IDACT 2.1-15. Per INSIGHT Appliance limited testing, it was identified that performance impact is minor and inside the guidelines provided by Symantec.

 

Symantec DLP Tech Article TECH248616: https://support.symantec.com/en_US/article.TECH248616.html

“Per operating system vendors, a primary side-effect of the vulnerability patches is an anticipated performance penalty, between 5 and 30%, for all software applications. DLP performance tests however do not indicate a noticeable performance degradation between unpatched and patched systems.”

 

For more information on IDACT 2.1-15, please visit https://support.insightdlp.com/hc/en-us/articles/115004313274. Please read IDACT 2.1-15 article before applying the update. 

 

If you have any questions or concerns, please contact support or your sales engineer.

 

 

 

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request

0 Comments

Article is closed for comments.