[Ksplice-cloudlinux6-updates] New Ksplice updates for CloudLinux 6 (2.6.32-954.3.5.lve1.4.79.el6)

Oracle Ksplice ksplice-support_ww at oracle.com
Thu Aug 27 13:23:31 PDT 2020


Synopsis: 2.6.32-954.3.5.lve1.4.79.el6 can now be patched using Ksplice
CVEs: CVE-2020-0543

Systems running CloudLinux 6 can now use Ksplice to patch against the
latest CloudLinux 6 kernel update, 2.6.32-954.3.5.lve1.4.79.el6.

INSTALLING THE UPDATES

We recommend that all users of Ksplice Uptrack running CloudLinux 6
install these updates.

On systems that have "autoinstall = yes" in /etc/uptrack/uptrack.conf,
these updates will be installed automatically and you do not need to
take any action.

Alternatively, you can install these updates by running:

# /usr/sbin/uptrack-upgrade -y


DESCRIPTION

* CVE-2020-0543: Side-channel information leak using SRBDS.

A side-channel information leak on some generations of Intel processors
could allow the leaking of internal microarchitectural buffers used by
instructions like RDRAND, RDSEED and SGX EGETKEY.

Updated microcode is required for this vulnerability to be mitigated.

The status of the mitigation can be found using the following command:
$ cat /sys/devices/system/cpu/vulnerabilities/srbds


* Various Spectre-V1 information leaks in KVM.

Various array accesses in KVM lack protection against Spectre variant
1 type attacks. An attacker could exploit this bug to read privileged
kernel memory.

SUPPORT

Ksplice support is available at ksplice-support_ww at oracle.com.





More information about the Ksplice-CloudLinux6-Updates mailing list