Not only older but also modern processors have proven vulnerable to "meltdown" and "specter". These flaws can initially only be fixed through changes to the software, i.e. the program code of operating systems or patches to individual applications such as Firefox.
It's been quite a shock when the vulnerabilities in the design of computer chips became known in early January. Especially Intel, but also ARM and to some extent AMD are being hit hard by the security holes.
To make matters worse, almost every computer and every smartphone is defenseless and that may have been the case for decades. Possible attacks that might have occurred are no longer traceable. The exceptional scale and the continued uncertainty make this case a catastrophe for the IT industry and ultimately for billions of users.
In these days, it's therefore very important for users to keep their operating systems up to date and to download provided updates in order to avoid severe problems.
Our Managed Server Customers do not have to worry about anything: we will import the updates as they become available.
For unmanaged server customers, i.e. those who have not booked the Managed Service, we ask that the appropriate patches be listed below.
Security updates and further information
Please note: In oder to close the vulnerabilities of the CPUs also BIOS updates will be required. For this, we keep close contact to our hardware providers. We will inform you here as the BIOS updates become available.
RHEL/Scientific/CentOS 6
https://access.redhat.com/errata/RHSA-2018:0008
https://access.redhat.com/errata/RHSA-2018:0013
https://access.redhat.com/errata/RHSA-2018:0024
https://access.redhat.com/errata/RHSA-2018:0030
RHEL/Scientific/CentOS 7
https://access.redhat.com/errata/RHSA-2018:0007
https://access.redhat.com/errata/RHSA-2018:0012
https://access.redhat.com/errata/RHSA-2018:0014
https://access.redhat.com/errata/RHSA-2018:0023
https://access.redhat.com/errata/RHSA-2018:0029
FreeBSD/PFsense (WIP)
https://www.freebsd.org/news/newsflash.html#event20180104:01
Ubuntu (WIP)
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown
Debian (WIP)
https://security-tracker.debian.org/tracker/CVE-2017-5715
https://security-tracker.debian.org/tracker/CVE-2017-5753
https://security-tracker.debian.org/tracker/CVE-2017-5754
If you have any questions, our support will be happy to advise you: support@schlundtech.de