Wednesday, April 17, 2024

Ksplice: Eliminate disruptive reboots by updating your system with Ksplice

 

Ksplice: Eliminate disruptive reboots by updating your system with Ksplice

  

Available to Oracle Linux customers with Oracle Linux Premier Support, Oracle Ksplice updates select, critical components of your Oracle Linux installation with all of the important security patches without needing to reboot.

With rebootless updates, you can:

  • Save time and pain by updating in seconds, while your systems are running.
  • Avoid downtime.
  • Prevent disastrous security incidents by making it easy to stay up to date.

Linux distributions require a reboot about once a month to stay up to date with important kernel and user-space security updates. Oracle Ksplice allows you to apply the same updates, without rebooting that would normally require an update with your package manager and a reboot.

Oracle Linux is the only Linux distribution to offer zero-downtime updates for select, critical user-space components. With Oracle Linux 6, 7, 8 and 9, Ksplice can patch glibc and openssl vulnerabilities whilst the system is running, without stopping applications and without interruption. This feature is exclusive to Oracle Linux Premier Support customers.

What gets patched?

Not all patches are created equal. Ksplice patches run-time security vulnerabilities and stability bugs. Whether it's the latest CVE targeting the network stack, an overflow in the DNS resolver, or a kernel panic caused by a poorly written driver, Ksplice will quickly provide protection to your system, without rebooting or restarting applications.

Ksplice supports the latest kernels from Oracle, including the Unbreakable Enterprise Kernel and the Red Hat Compatible Kernel, as well as kernels from Ubuntu and CentOS. See the Ksplice User's Guide for the up-to-date list of all kernels Ksplice supports.

Ksplice supports glibc and openssl for all Oracle Linux versions that are covered by Oracle Linux Premier Support.

 

 

 

 

(root) # ksplice -y all upgrade

The following steps will be taken:

Install [8v0l3voi]: CVE-2016-0702: RSA key disclosure on Sandy Bridge CPU's (CacheBleed).

Install [qn7jy7c6]: CVE-2015-7547: Remote code execution in glibc DNS resolver.

Done!

The following steps will be taken:

Install [b4ppb8m2] Race condition with outstanding tx counter in IP-over-InfiniBand.

Install [280qdpcz] CVE-2016-3157: Xen I/O port access privilege escalation in x86-64.

Installing [b4ppb8m2] Race condition with outstanding tx counter in IP-over-InfiniBand.

Installing [280qdpcz] CVE-2016-3157: Xen I/O port access privilege escalation in x86-64.

Your kernel is fully up to date.

Effective kernel version is 4.1.12-32.2.3.el6uek

 

 

(root) # ksplice all show

Ksplice user-space updates installed:

rsyslogd (2318)

sshd (2697):

- [qn7jy7c6]: CVE-2015-7547: Remote code execution in glibc DNS resolver.

certmonger (3007):

- [qn7jy7c6]: CVE-2015-7547: Remote code execution in glibc DNS resolver.

- [8v0l3voi]: CVE-2016-0702: RSA key disclosure on Sandy Bridge CPU's (CacheBleed).

Ksplice kernel updates installed:

Installed updates:

[b4ppb8m2] Race condition with outstanding tx counter in IP-over-InfiniBand.

[280qdpcz] CVE-2016-3157: Xen I/O port access privilege escalation in x86-64.

Effective kernel version is 4.1.12-32.2.3.el6uek

(root) #

 

 

 

More details of uptrack and ksplice

https://oracle-samples.github.io/oltrain/posts/ol/ksplice/post-3/

 

No comments:

Post a Comment