Search Suggestions

      Intel CPU vulnerabilities

      On 14 May 2019 security vulnerabilities were published regarding Intel and other processors, including those used in our servers, which could allow attackers to access sensitive data.

      Action required for Self-Managed Servers

      As the vulnerabilities can’t be fixed on the hardware level, OS developers are updating their operating systems to work around the error. For this reason, you will need to patch the relevant OS on your Self-Managed server.

      The Microarchitectural Data Sampling (MDS) attacks, include 3 variants or attack vectors, and are known as;

      • Fallout attack
      • Zombieload
      • Rogue In-Flight Data Load (RIDL)

      Operating System Patches

      Refer to the relevant Security Advisory for your Operating System

      Debian

      Security Advisory

      Ubuntu

      Announcement: https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/MDS

      Security Advisory

      RedHat / CentOS

      Announcement: https://access.redhat.com/security/vulnerabilities/mds

      Security Advisory

      OpenSUSE

      Security Advisory

      Microsoft Windows

      Security Advisory