On 14 May 2019 security vulnerabilities were published regarding Intel and other processors, including those used in Hetzner servers, which could allow attackers to access sensitive data.

Action required for Self-Managed Servers

As the vulnerabilities can’t be fixed on the hardware level, OS developers are updating their operating systems to work around the error. For this reason, you will need to patch the relevant OS on your Self-Managed server.

The Microarchitectural Data Sampling (MDS) attacks, include 3 variants or attack vectors, and are known as;

  • Fallout attack
  • Zombieload
  • Rogue In-Flight Data Load (RIDL)

Operating System Patches

Refer to the relevant Security Advisory for your Operating System

Debian

Security Advisory

Ubuntu

Announcement: https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/MDS

Security Advisory

RedHat / CentOS

Announcement: https://access.redhat.com/security/vulnerabilities/mds

Security Advisory

OpenSUSE

Security Advisory

Microsoft Windows

Security Advisory

 

 

  • Did you find this article helpful?
  • YesNo
Do you need further assistance? Contact us