Meltdown and Spectre CPU vulnerabilities
On 3 Jan 2018 security vulnerabilities were published regarding Intel and other processors, including those used in our servers, which could allow attackers to access sensitive data.
Our system engineers are following developments carefully and will ensure that all shared Web Hosting servers and Managed Servers receive the relevant updates. No action is required by customers of these services.
Action required for Self-Managed Servers
As the vulnerabilities can’t be fixed on the hardware level, OS developers are updating their operating systems to work around the error. For this reason, all customers with Self-Managed servers will need to patch the relevant OS on their server.
The vulnerabilities include 3 variants or attack vectors, and are known as
Operating System patches
Refer to the relevant Security Advisory for your Operating System
Debian
- Security Advisory
Ubuntu
Announcement: https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown
- Security Advisory
RedHat / CentOS
Announcement: https://access.redhat.com/security/vulnerabilities/speculativeexecution
- Security Advisory
OpenSUSE
Announcement: https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00001.html
- Security Advisory
Archlinux
- Security Advisory
Microsoft Windows
Announcement: https://support.microsoft.com/en-us/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution-s