docs/advisories/spectre-meltdown-kernel-update.md
| NAME | Meltdown and Spectre Hardware Issues |
| Description | Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. |
| Related CVE(s) | CVE-2017-5715 CVE-2017-5753 CVE-2017-5754 |
| NVD Severity | medium (attack range: local) |
| Document Last Updated | January 07,2018 |
Three CVEs have been made public, representing different ways to exploit the same underlying speculative-execution hardware issue:
The kernel updates that are the subject of this advisory are primarily intended to mitigate CVE-2017-5753 and CVE-2017-5754.
If you do not see "Kernel/User page tables isolation: enabled" in dmesg, you are vulnerable.
dmesg -H | grep 'page tables isolation'
[ +0.000000] Kernel/User page tables isolation: enabled
For the kops-maintained AMIs, the following AMIs contain an updated kernel:
These are the images that are maintained by the kubernetes/kops project; please refer to other vendors for the appropriate AMI version.
For all examples please replace $CLUSTER with the appropriate kOps cluster
name.
kops get ig --name $CLUSTER
Update the instance group with the appropriate image version via a kops edit command or kops replace -f mycluster.yaml.
Perform a dry-run update, verifying that all instance groups are updated.
kops update cluster --name $CLUSTER
Update the cluster configuration, so that new instances will start with the updated image.
kops update cluster --name $CLUSTER --yes
Perform a dry-run rolling-update, to verify that all instance groups will be rolled.
kops rolling-update cluster --name $CLUSTER
Performing a rolling-update of the cluster ensures that all old instances and replaced with new instances, running the updated image.
kops rolling-update cluster --name $CLUSTER --yes