Dear All, |
You’ve probably already read about one of the most widespread security issues in modern computing history — colloquially known as “Meltdown” (CVE-2017-5754) and “Spectre” (CVE-2017-5753 and CVE-2017-5715) — affecting practically every computer including Home Pcs and Laptops built in the last 20 years, running any operating system. |
|
Spectre and Meltdown are the names of the flaws found in a number of processors from Intel, ARM and AMD that could allow hackers to access passwords, encryption keys and other private information from open applications. |
The flaws, found by a number of people including a member of Google’s Project Zero, are sending shock waves through the IT world. Namely, it was revealed that they had been present in chip designs for over 20 years, and that they affect a number of companies’ processors, meaning the flaws could be found on a huge number of devices, from PCs to web servers and even smartphones. |
|
So far it doesn’t look like the Spectre or Meltdown flaws have been used in an attack, and device manufacturers are working with Intel, ARM and AMD to fix these flaws. |
Intel has claimed that the exploits can't corrupt, modify or delete data. While it’s good to see companies set aside their differences to find a fix for these flaws, it has emerged that one flaw, Spectre, may need a processor redesign to fix. |
However, this does mean that future processors should be free from the Spectre and Meltdown security flaws. So, don’t be too alarmed, but keep an eye on any updates your device offers, and follow our advice on how to protect against the Meltdown and Spectre CPU security flaws. |
Before making any changes: |
|
|
We have already patched our Shared/Reseller/Corporate Hosting Servers (Both Linux and Windows). Cloud Hosting and Other dedicated infrastructures will be patched very soon. We are waiting for the new patches and will do as and when required. |
For Debian/Ubuntu: |
How to Patch Debian/Ubuntu:
|
|
|
|
How to Patch Windows:
|
|
Steps 1 and 2 are documented on Microsoft's website. |
|
Please feel free to contact us if you have any doubts regarding this email. |
Friday, January 12, 2018