How To Verify Your Rcs.is is Protected From the MDS Vulnerability
Microarchitectural Data Sampling (MDS) Advisory: On 14 May 2019, Intel released a statement regarding Microarchitectural Data Sampling (MDS), a significant security vulnerability that affects cloud providers with multi-tenant environments, including Rcs.is. In addition to the steps we are taking described on our blog, we strongly recommend that you update your internal Rcs.is kernels to ensure you have the latest available bug fixes and security patches.
Here are the steps to patch your Rcs.is for the Intel MDS vulnerability (also known as Zombieload) and to verify the patch applied successfully.
Upgrade the Rcs.is’s Kernel
Full steps, including explanations, for how to upgrade your Rcs.iss’ kernels can be found on our article How to Upgrade to the Latest Kernel. Make sure you power off and power on the Rcs.is when done, as explained in that article.
Verify Patch
If your Rcs.is is running a Linux OS (Ubuntu, Debian, CentOS, Fedora), you can use the following command to verify that it has been patched:
A patched Rcs.is returns:
That file path only exists if the Rcs.is has been patched, so an unpatched Rcs.is returns:
If you’re using FreeBSD, you can find more information on this FreeBSD Security Advisory.