Summary
Patch Kernel for Meltdown CPU Vulnerability
Release date: Jan 12, 2018
Vulnerability identifier: NR18-03
Priority: High
Affected software
The following New Relic agent versions are affected:
Name | Affected version | Notes | Remediated version |
---|---|---|---|
Synthetics Private Location | Version 1.5.2 or lower | 1.5.3 |
Vulnerability information
Private location images with synthetic monitoring have been updated with patches to protect against the Meltdown CPU vulnerability. Patches to address Spectre have yet to be released by Ubuntu.
Additionally, customers can run in-place upgrades by accessing their private location and running:
sudo apt-get updatesudo apt-get dist-upgrade
and subsequently rebooting their machine.
Additional Information: Ubuntu Advisory
Mitigating factors
- Private locations run inside a customer’s data center and will be monitoring internal, trusted web applications.
Workarounds
No known workarounds exist.
Report security vulnerabilities to New Relic
New Relic is committed to the security of our customers and their data. If you believe you have found a security vulnerability in one of our products or websites, we welcome and greatly appreciate you reporting it to New Relic's coordinated disclosure program. For more information, see Reporting security vulnerabilities.
For more help
Additional documentation resources include:.