Meltdown and Spectre vulnerabilities - CA Directory update

Discussion created by Daniel_Wachsmuth Employee on Jan 8, 2018

CA Directory

Date: 1/8/2018



CA Directory Customers


The CA Technologies Directory Product Team


Proactive Notification: Critical Alert for CA Directory


Dear CA Customer:

The purpose of this Critical Alert is to inform you of our status update regarding the Meltdown and Spectre vulnerabilities. Please read the information provided below and follow the instructions in order to avoid being impacted by this problem.


PRODUCT(S) AFFECTED: CA Directory                                          RELEASES: all



CVE-2017-5754, CVE-2017-5753, and CVE-2017-5715 have been recently identified in industry-wide "multiple microarchitectural (hardware) implementation issues affecting many modern microprocessors, requiring updates to the Linux kernel, virtualization-related components, and/or in combination with a microcode update."

Ref: https://access.redhat.com/security/vulnerabilities/speculativeexecution


"An unprivileged attacker can use these flaws to bypass conventional memory security restrictions in order to gain read access to privileged memory that would otherwise be inaccessible. There are 3 known CVEs related to this issue in combination with Intel, AMD, and ARM architectures. Additional exploits for other architectures are also known to exist. These include IBM System Z, POWER8 (Big Endian and Little Endian), and POWER9 (Little Endian)."

Ref: https://access.redhat.com/security/vulnerabilities/speculativeexecution


No specific impact to this product set, but please read on.


There is currently no known workaround for this issue.


There is currently no resolution to this issue.  Customers are advised to apply vendor-provided patches as they become available.

As more information becomes available from third-party vendors, CA will issue additional notifications to advise customers of potential resolutions and next steps for updating any CA components if necessary.

If you have any questions about this Critical Alert, please contact CA Support.
Thank you,

CA Support Team

Copyright © 2017 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies.

To unsubscribe from this service, please follow the link below: