System Status
Buy Now
  • Rackspace Cloud
  • Email & Apps
  • Fanatical Support for AWS
  • Managed Google Cloud Platform
  • Office 365
Login
  • MyRackspace Portal
  • Cloud Control Panel
  • Rackspace Webmail Login
  • Cloud Office Control Panel
  • Support Home
  • How-To
  • Developer Documentation
  •  Blogs 
    • Technical Blog
    • Rackspace Blog
    • Solve: Thought Leadership

Support Network

End-to-End Multicloud Solutions.   Solving Together.â„¢   Learn more at Rackspace.com

How–To Home

General


RPC mitigations against CPU speculative execution vulnerabilities

Last updated on:  2018-08-20

Authored by:  Marc Nourani


Rackspace continues to evaluate and address a set of speculative execution vulnerabilities affecting certain CPUs. You can find more information about the vulnerabilities in the following locations:

Spectre and Meltdown

Details related to the vulnerabilities can be found in:

  • CVE-2017-5753
  • CVE-2017-5715
  • CVE-2017-5754

Spectre and Meltdown variants 3A and 4 (May 21, 2018)

Details related to the vulnerabilities can be found in:

  • CVE-2018-3639
  • CVE-2018-3640
  • US Cert’s Alert TA18-141A

L1 Terminal Fault (L1TF) or Foreshadow (August 14, 2018)

Details related to the vulnerabilities can be found in:

  • CVE-2018-3615
  • CVE-2018-3620
  • CVE-2018-3646

Rackspace Private Cloud - OpenStack

Ubuntu has released the following articles to explain the impact of these vulnerabilities:

  • SpectreAndMeltdown
  • Meltdown, Spectre and Ubuntu: What you need to know

Additional Ubuntu security notices have been opened for QEMU/libvirt:

  • USN-3560-1: QEMU update
  • USN-3561-1: libvirt update

Mitigation

HP and Dell previously released microcode updates to mitigate Ubuntu Openstack, but they pulled those patches from circulation due to instability concerns. Currently, we are waiting for microcode and firmware updates from our hardware vendors.

Note: Patching hardware and software will result in hypervisor and possible API downtime. Patching the microcode and firmware may result in hypervisor and API downtime

Rackspace Private Cloud - Red Hat

Red Hat has published various articles that explain the impact of these vulnerabilities. The following packages contain the necessary errata to remediate and address the anticipated performance impacts associated with the fix:

  • Kernel Side-Channel Attacks - CVE-2017-5754 CVE-2017-5753 CVE-2017-5715
  • Speculative Execution Exploit Performance Impacts - Describing the performance impacts to security patches for CVE-2017-5754 CVE-2017-5753 and CVE-2017-5715

Mitigation

After receiving a customer request, Rackspace will apply the errata to the Red Hat OSP-based Rackspace Private Cloud – Red Hat environments.

Note: The ability to fully remediate these vulnerabilities is pending the availability of updated vendor firmware and microcode updates. After the firmware and microcode updates are available, a second maintenance that will result in hypervisor downtime will be needed.

Further remediation might be needed, because evaluation of these vulnerabilities continues. When additional information becomes available, we will provide updates.

As always, contact your support team if you have any questions.

Share this information:

©2020 Rackspace US, Inc.

Except where otherwise noted, content on this site is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License

See license specifics and DISCLAIMER

About Rackspace
  • About
  • Customer Stories
  • Events
  • Programs
Blogs
  • The Rackspace Blog
  • Technical Blog
  • Solve: Thought Leadership
  • News
  • Contact Information
  • Legal
  • Careers
Site Information
  • Style Guide for Technical Content
  • Trademarks
  • Privacy Statement
  • Website Terms
Support Network
  • Support Network Home
  • Rackspace How-To
  • API Documentation
  • Developer Center
  • ©2020 Rackspace US, Inc.