This article was created in response to a support issue logged with K2. The content may include typographical errors and may be revised at any time without notice. This article is not considered official documentation for K2 software and is provided "as is" with no warranties.
Recently, there has been a great deal of discussion about the Meltdown and Spectre vulnerabilities. These vulnerabilities affect a wide range of CPUs, spanning many different operating systems. Some additional information: https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
These vulnerabilities affect a wide range of CPUs, spanning many different operating systems.
In light of the recent Meltdown and Spectre vulnerabilities, K2 Support can verify the following statement regarding K2 software:
The Meltdown and Spectre vulnerabilities allow exposure of data at kernel memory level. K2 software relies on the underlying operating system to handle this level of memory access. As such, no K2 software fixes exist to address these vulnerabilities. Please be sure to patch your operating systems and firmware accordingly.