For CloudLinux 7, run the command:
yum install kernel-3.10.0-962.3.2.lve1.5.38.el7
For CloudLinux 6 Hybrid, run the command:
yum install kernel-3.10.0-962.3.2.lve1.5.38.el6h
CloudLinux 7 and CloudLinux 6 Hybrid kernel version 3.10.0-962.3.2.lve1.5.38 has been rolled out to 100% and is now available for download from our production repository.
The Linux kernel provides vulnerability status information through sysfs. For SRBDS this can be accessed by the following sysfs file: /sys/devices/system/cpu/vulnerabilities/srbds
The possible values contained in this file are:
Not affected | Processor is not vulnerable |
Vulnerable | Processor is vulnerable and mitigation is disabled |
Vulnerable: No microcode | Processor is vulnerable and microcode is missing mitigation |
Mitigation: Microcode | Processor is vulnerable and mitigation is in effect |
Mitigation: TSX disabled | Processor is only vulnerable when TSX is enabled while this system was booted with TSX disabled |
Unknown: Dependent on hypervisor status | Running on virtual guest processor that is affected but with no way to know if the host processor is mitigated or vulnerable |
Intel will release microcode updates that modify the RDRAND, RDSEED, and EGETKEY instructions to overwrite secret special register data in the shared staging buffer before the secret data can be accessed by another logical processor.
For CloudLinux 7, run the command:
yum install kernel-3.10.0-962.3.2.lve1.5.38.el7
For CloudLinux 6 Hybrid, run the command:
yum install kernel-3.10.0-962.3.2.lve1.5.38.el6h