From 31e63bb8c866373801f8777e98a73f5255691497 Mon Sep 17 00:00:00 2001 From: Lindacornwall <55097368+Lindacornwall@users.noreply.github.com> Date: Tue, 29 Oct 2024 15:54:18 +0000 Subject: [PATCH] Update Advisory-EGI-SVG-2024-24.md --- 2024/Advisory-EGI-SVG-2024-24.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/2024/Advisory-EGI-SVG-2024-24.md b/2024/Advisory-EGI-SVG-2024-24.md index c587dd5..4077cc3 100644 --- a/2024/Advisory-EGI-SVG-2024-24.md +++ b/2024/Advisory-EGI-SVG-2024-24.md @@ -34,7 +34,7 @@ and take appropriate action using the references below. Among others, RedHat and derivatives have provided microcode fixes for RHEL 9 [R 1] and RHEL 8 [R 2]. Likewise for the different Debian versions [R 9]. -For the new microcode to take effect one needs to reboot the (vulnerable) machine. +For the new microcode to take effect it is necessary to reboot the (vulnerable) machine. If anyone becomes aware of any situation where such a vulnerability has a significant impact on the EGI infrastructure, then please inform EGI SVG.