1 00:00:01,090 --> 00:00:03,850 covering the week's top textbooks with 2 00:00:03,850 --> 00:00:03,860 covering the week's top textbooks with 3 00:00:03,860 --> 00:00:06,970 covering the week's top textbooks with slight Linux bias the latest Intel 4 00:00:06,970 --> 00:00:06,980 slight Linux bias the latest Intel 5 00:00:06,980 --> 00:00:09,070 slight Linux bias the latest Intel crosstalk vulnerability is now patched 6 00:00:09,070 --> 00:00:09,080 crosstalk vulnerability is now patched 7 00:00:09,080 --> 00:00:12,850 crosstalk vulnerability is now patched in Debian gnu/linux sent OS Linux as 8 00:00:12,850 --> 00:00:12,860 in Debian gnu/linux sent OS Linux as 9 00:00:12,860 --> 00:00:15,249 in Debian gnu/linux sent OS Linux as well as Red Hat Enterprise Linux systems 10 00:00:15,249 --> 00:00:15,259 well as Red Hat Enterprise Linux systems 11 00:00:15,259 --> 00:00:17,349 well as Red Hat Enterprise Linux systems the recently found Hardware 12 00:00:17,349 --> 00:00:17,359 the recently found Hardware 13 00:00:17,359 --> 00:00:19,810 the recently found Hardware vulnerability known as crosstalk was 14 00:00:19,810 --> 00:00:19,820 vulnerability known as crosstalk was 15 00:00:19,820 --> 00:00:21,609 vulnerability known as crosstalk was discovered by researchers from view 16 00:00:21,609 --> 00:00:21,619 discovered by researchers from view 17 00:00:21,619 --> 00:00:24,099 discovered by researchers from view university Amsterdam in some Intel 18 00:00:24,099 --> 00:00:24,109 university Amsterdam in some Intel 19 00:00:24,109 --> 00:00:26,800 university Amsterdam in some Intel processors the flaw could allow local 20 00:00:26,800 --> 00:00:26,810 processors the flaw could allow local 21 00:00:26,810 --> 00:00:29,200 processors the flaw could allow local attackers or virtual machine guests to 22 00:00:29,200 --> 00:00:29,210 attackers or virtual machine guests to 23 00:00:29,210 --> 00:00:30,880 attackers or virtual machine guests to expose sensitive information like 24 00:00:30,880 --> 00:00:30,890 expose sensitive information like 25 00:00:30,890 --> 00:00:34,090 expose sensitive information like cryptographic keys from other users or 26 00:00:34,090 --> 00:00:34,100 cryptographic keys from other users or 27 00:00:34,100 --> 00:00:37,180 cryptographic keys from other users or VMS already patched in all supported 28 00:00:37,180 --> 00:00:37,190 VMS already patched in all supported 29 00:00:37,190 --> 00:00:39,430 VMS already patched in all supported Ubuntu releases the vulnerability has 30 00:00:39,430 --> 00:00:39,440 Ubuntu releases the vulnerability has 31 00:00:39,440 --> 00:00:41,799 Ubuntu releases the vulnerability has also now been patched in Debian Buster 32 00:00:41,799 --> 00:00:41,809 also now been patched in Debian Buster 33 00:00:41,809 --> 00:00:45,250 also now been patched in Debian Buster and stretch plus sent OS 6 & 7 as well 34 00:00:45,250 --> 00:00:45,260 and stretch plus sent OS 6 & 7 as well 35 00:00:45,260 --> 00:00:48,220 and stretch plus sent OS 6 & 7 as well as Red Hat Enterprise Linux version 6 36 00:00:48,220 --> 00:00:48,230 as Red Hat Enterprise Linux version 6 37 00:00:48,230 --> 00:00:51,130 as Red Hat Enterprise Linux version 6 and 7 to mitigate the vulnerability in 38 00:00:51,130 --> 00:00:51,140 and 7 to mitigate the vulnerability in 39 00:00:51,140 --> 00:00:53,170 and 7 to mitigate the vulnerability in their systems users will have to install 40 00:00:53,170 --> 00:00:53,180 their systems users will have to install 41 00:00:53,180 --> 00:00:55,509 their systems users will have to install the latest Linux kernel and Intel 42 00:00:55,509 --> 00:00:55,519 the latest Linux kernel and Intel 43 00:00:55,519 --> 00:00:57,729 the latest Linux kernel and Intel microcode updates which are now 44 00:00:57,729 --> 00:00:57,739 microcode updates which are now 45 00:00:57,739 --> 00:00:59,529 microcode updates which are now available in the stable software 46 00:00:59,529 --> 00:00:59,539 available in the stable software 47 00:00:59,539 --> 00:01:01,750 available in the stable software repositories of their distributions 48 00:01:01,750 --> 00:01:01,760 repositories of their distributions 49 00:01:01,760 --> 00:01:04,210 repositories of their distributions although Debian stretch users must 50 00:01:04,210 --> 00:01:04,220 although Debian stretch users must 51 00:01:04,220 --> 00:01:06,580 although Debian stretch users must enable the non free repository to get 52 00:01:06,580 --> 00:01:06,590 enable the non free repository to get 53 00:01:06,590 --> 00:01:09,070 enable the non free repository to get the patch make sure you reboot your 54 00:01:09,070 --> 00:01:09,080 the patch make sure you reboot your 55 00:01:09,080 --> 00:01:11,260 the patch make sure you reboot your systems after installing the new Linux 56 00:01:11,260 --> 00:01:11,270 systems after installing the new Linux 57 00:01:11,270 --> 00:01:15,670 systems after installing the new Linux kernel and Intel micro code updates