On 14 May 2019 security vulnerabilities were published regarding Intel and other processors, including those used in our servers, which could allow attackers to access sensitive data.

Action required for Self-Managed Servers

As the vulnerabilities can’t be fixed on the hardware level, OS developers are updating their operating systems to work around the error. For this reason, you will need to patch the relevant OS on your Self-Managed server.

The Microarchitectural Data Sampling (MDS) attacks, include 3 variants or attack vectors, and are known as;

  • Fallout attack
  • Zombieload
  • Rogue In-Flight Data Load (RIDL)

Operating System Patches

Refer to the relevant Security Advisory for your Operating System


Security Advisory


Announcement: https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/MDS

Security Advisory

RedHat / CentOS

Announcement: https://access.redhat.com/security/vulnerabilities/mds

Security Advisory


Security Advisory

Microsoft Windows

Security Advisory



  • Did you find this article helpful?
  • YesNo
Do you need further assistance? Contact us