Most of the latest vendor kernels already have Meltdown (CVE-2017-5754) fix included. Since thecurrent KernelCare patches do not provide this fix for older kernels, "effective" version ("uname"in kpatch.info files) should not be set to those latest vendor kernels, but kept at the latest oneswithout Meltdown fix. This behavior was added to deploy-scripts but currently isn't considered to beready for merge since only comparison of rpm-based versions is supported. However, this particularrelease needs this functionality only to handle centos7 patches ("latest" changed from 693.11.6 to693.11.1) so not to postpone it even further a local copy of changed kcaredeploy.py script is provided.Before running makedeploy, please, copy the attached kcaredeploy.py file over existingpy/kcaredeploy.py in checked out sources. After release archive is generated, the original versionof this file can be restored with 'git checkout HEAD -- py/kcaredeploy.py' and the absence of anylocal changes in tracked files verified with 'git status -uno'.Sorry for the inconvenience, this is strictly a temporary solution for two existing releaserequests. In future, the relevant code will be merged and no local changes will be required.
Systems with AUTO_UPDATE=True (DEFAULT) in /etc/sysconfig/kcare/kcare.conf will automatically update, and no action is needed for them.
You can manually update the server by running:
# /usr/bin/kcarectl --update
Changelog:centos7:
CVE-2017-5753: 'An industry-wide issue was found in the way many modern microprocessor
designs have implemented speculative execution of instructions (a commonly used
performance optimization). There are three primary variants of the issue which
differ in the way the speculative execution can be exploited. Variant CVE-2017-5753
triggers the speculative execution by performing a bounds-check bypass. It relies
on the presence of a precisely-defined instruction sequence in the privileged
code as well as the fact that memory accesses may cause allocation into the microprocessor''s
data cache even for speculatively executed instructions that never actually commit
(retire). As a result, an unprivileged attacker could use this flaw to cross the
syscall boundary and read privileged memory by conducting targeted cache side-channel
attacks. ATTENTION: This is just a partial fix for Spectre attack. The other part
(CVE-2017-5753) and Meltdown is still relevant.'
cvelist: [CVE-2017-5753]
latest-version: 3.10.0-693.11.1.el7
centos7-plus:
CVE-2017-5753: 'An industry-wide issue was found in the way many modern microprocessor
designs have implemented speculative execution of instructions (a commonly used
performance optimization). There are three primary variants of the issue which
differ in the way the speculative execution can be exploited. Variant CVE-2017-5753
triggers the speculative execution by performing a bounds-check bypass. It relies
on the presence of a precisely-defined instruction sequence in the privileged
code as well as the fact that memory accesses may cause allocation into the microprocessor''s
data cache even for speculatively executed instructions that never actually commit
(retire). As a result, an unprivileged attacker could use this flaw to cross the
syscall boundary and read privileged memory by conducting targeted cache side-channel
attacks. ATTENTION: This is just a partial fix for Spectre attack. The other part
(CVE-2017-5753) and Meltdown is still relevant.'
cvelist: [CVE-2017-5753]
latest-version: 3.10.0-693.11.1.el7
pve-3.10:
CVE-2017-5753: 'An industry-wide issue was found in the way many modern microprocessor
designs have implemented speculative execution of instructions (a commonly used
performance optimization). There are three primary variants of the issue which
differ in the way the speculative execution can be exploited. Variant CVE-2017-5753
triggers the speculative execution by performing a bounds-check bypass. It relies
on the presence of a precisely-defined instruction sequence in the privileged
code as well as the fact that memory accesses may cause allocation into the microprocessor''s
data cache even for speculatively executed instructions that never actually commit
(retire). As a result, an unprivileged attacker could use this flaw to cross the
syscall boundary and read privileged memory by conducting targeted cache side-channel
attacks. ATTENTION: This is just a partial fix for Spectre attack. The other part
(CVE-2017-5753) and Meltdown is still relevant.'
cvelist: [CVE-2017-5753]
latest-version: 3.10.0-22-pve_3.10.0-52
rhel7:
CVE-2017-5753: 'An industry-wide issue was found in the way many modern microprocessor
designs have implemented speculative execution of instructions (a commonly used
performance optimization). There are three primary variants of the issue which
differ in the way the speculative execution can be exploited. Variant CVE-2017-5753
triggers the speculative execution by performing a bounds-check bypass. It relies
on the presence of a precisely-defined instruction sequence in the privileged
code as well as the fact that memory accesses may cause allocation into the microprocessor''s
data cache even for speculatively executed instructions that never actually commit
(retire). As a result, an unprivileged attacker could use this flaw to cross the
syscall boundary and read privileged memory by conducting targeted cache side-channel
attacks. ATTENTION: This is just a partial fix for Spectre attack. The other part
(CVE-2017-5753) and Meltdown is still relevant.'
cvelist: [CVE-2017-5753]
latest-version: 3.10.0-693.11.1.el7
Regards,
Igor Seletskiy | CEO