lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <SN1PR05MB19026F7A5DACFBF4C75EE167B9870@SN1PR05MB1902.namprd05.prod.outlook.com> Date: Fri, 4 May 2018 02:47:57 +0000 From: VMware Security Response Center <security@...are.com> To: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>, "bugtraq@...urityfocus.com" <bugtraq@...urityfocus.com> CC: VMware Security Response Center <security@...are.com> Subject: Updated VMSA-2018-0007.3: VMware Virtual Appliance updates address side-channel analysis due to speculative execution -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Changelog: 2018-05-03: VMSA-2018-0007.3 Updated in conjunction with the release of vSphere Data Protection (VDP) 6.1.5 on 2018-05-03. -----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.4.1 (Build 490) Charset: utf-8 wj8DBQFa6wKlDEcm8Vbi9kMRAvFXAJ4vMN1A2VdHlOIjk/UuRcDFffolEgCg/Spr qbYXC9jLYq0Yrj16jjBVgrk= =f84t -----END PGP SIGNATURE-----
Powered by blists - more mailing lists