Meltdown and Spectre CPU vulnerabilities

On 3 Jan 2018 security vulnerabilities were published regarding Intel and other processors, including those used in our servers, which could allow attackers to access sensitive data.

Our system engineers are following developments carefully and will ensure that all shared Web Hosting servers and Managed Servers receive the relevant updates. No action is required by customers of these services.

Action required for Self-Managed Servers

As the vulnerabilities can’t be fixed on the hardware level, OS developers are updating their operating systems to work around the error. For this reason, all customers with Self-Managed servers will need to patch the relevant OS on their server.

The vulnerabilities include 3 variants or attack vectors, and are known as

Operating System patches

Refer to the relevant Security Advisory for your Operating System

Debian

Ubuntu

Announcementhttps://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown

RedHat / CentOS

Announcementhttps://access.redhat.com/security/vulnerabilities/speculativeexecution

OpenSUSE

Announcementhttps://lists.opensuse.org/opensuse-security-announce/2018-01/msg00001.html

Archlinux

Microsoft Windows

Announcementhttps://support.microsoft.com/en-us/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution-s