Linux OS mitigations against CPU speculative execution vulnerabilities

Rackspace continues to evaluate and address a set of speculative execution vulnerabilities affecting certain central processing units (CPUs). You can find more information about the vulnerabilities in the following locations:

Spectre and Meltdown

Details related to the vulnerabilities can be found in:

Spectre and Meltdown variants 3A and 4 (May 21, 2018)

Details related to the vulnerabilities can be found in:

L1 Terminal Fault (L1TF) or Foreshadow (August 14, 2018)

Details related to the vulnerabilities can be found in:

Kernel updates to mitigate specific variants of the exploits on the supported Linux® distributions at Rackspace (Red Hat® and CentOS® 6.7+ & 7.3+; Ubuntu® 14.04 & 16.04 LTS) have been released. For additional information on these patches, see https://access.redhat.com/security/vulnerabilities/speculativeexecution and https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown.

📘

These updates might impact performance to an extent dependent upon specific workloads. Red Hat has provided information regarding potential performance impacts at Speculative Execution Exploit Performance Impacts.

Servers must be rebooted to apply the new kernel. At this time, Rackspace does not intend to force reboots of customer servers. For those customers who want to apply the update, Rackspace can install the new kernel and reboot servers immediately. Alternatively, Rackspace can install the new kernel and customers can schedule the reboots to occur in the future via the following methods:

  • Dedicated Physical Server: MyRackspace Portal -> Services -> Reboot Scheduling

  • VMware® Virtual Server and Managed Operations Rackspace Public Cloud Servers: Supply the date, time, and time zone. Rackspace will schedule an automated reboot on behalf of the customer.

Operating systems listed as End of Life (EOL) by the vendor might not receive patches. For those configurations that run an older EOL operating system including (but not limited to) Red Hat Enterprise Linux 5, CentOS 5, and Ubuntu 12 LTS, Rackspace recommends that customers upgrade to a supported version.

Customers on managed colocation (colo) or Managed Infrastructure Rackspace Public Cloud environments should reference the vendors for their recommended solutions to mitigate the vulnerability via patches of the operating system.

Further remediation might be necessary as evaluation of these vulnerabilities continues.

To fully remediate against the Spectre/Meltdown variants referenced in CVE-2017-5753, CVE-2017-5715, and CVE-2017-5754, dedicated devices will also need a BIOS firmware update. Instructions for applying firmware updates are outlined in Firmware/Microcode mitigations against CPU speculative execution vulnerabilities.

Further remediation might be necessary as evaluation of these vulnerabilities continues.

As always, please contact your support team if you have any questions.