- Plesk for Linux
- Plesk for Windows
Intel Processor MDS Vulnerabilities
- Verifying protection
On May 14, 2019, Intel published information about a group of speculative execution side channel vulnerabilities known as Microarchitectural Data Sampling (also known as Zombieload, RIDL, and Fallout). Follow the link for the additional information - https://www.intel.com/content/www/us/en/architecture-and-technology/mds.html#introtext_1218267994
A potential security vulnerability in CPUs may allow information disclosure. Intel is releasing Microcode Updates (MCU) updates to mitigate this potential vulnerability.
These vulnerabilities are known as:
- CVE-2018-12126 - Microarchitectural Store Buffer Data Sampling
- CVE-2018-12130 - Microarchitectural Fill Buffer Data Sampling
- CVE-2018-12127 - Microarchitectural Load Port Data Sampling
- CVE-2018-11091 - Microarchitectural Data Sampling Uncacheable Memory
AMD processors are not vulnerable. Only Intel processors are affected.
Follow the recommendations from OS vendors and keep your operating system up-to-date.
If you are using Kernel Care extension you can apply kernel patches.
Note: KernelCare will start releasing live patches for MDS on Friday, May 17.
If not, refer below to the latest information from OS vendors at the moment:
According to the forum
Announcements have gone out, packages are pushed, mirrors are updating. If you don't see anything new soon then try yum clean all as it only refreshes every 6 hours by default.
Follow the Cloudlinux blog.
The latest information at the moment:
The instructions can be found at Ubuntu Documentation Checking System Status.
Follow the instructions from Microsoft to identify affected systems.