Kernel was updated to version 2.6.32-896.16.1.lve1.4.49.el6.x86_64 and microcode updates were installed. This added the most recently available patches against Meltdown and Spectre attacks (CVE-2017-5753, CVE-2017-5715, CVE-2017-5754)

CVE-2017-5753

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

CVE-2017-5715

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

CVE-2017-5754

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.


This is a rebase of the kernel to the  latest version. The kernel will continue to be updated every 4 hours with the latest patches and fixes by our KernelCare service that provides reboot-less kernel patching.

We suspect that there will be more patches necessitating server reboots relating to these three incidents (or to any subsequent related incidents) in the coming days and weeks as more patches filter down from the kernel developers.

Saturday, January 6, 2018



« Back