The Spectre and Meltdown vulnerabilities have sent shockwaves through the tech world in the past few weeks, but what exactly are they?
Spectre and Meltdown are both exploits caused by critical vulnerabilities in the modern processor. These exploits allow an attacker to steal and gain information that is stored in memory.
At this moment, we believe that most cloud providers have implemented patches to mitigate the dangers. However, you need to check with your respective cloud providers regarding their patch status.
You can find technical papers including more complete information regarding the vulnerabilities here: https://meltdownattack.com/
What should RunCloud users do about Spectre and Meltdown?
If you haven’t changed the RunCloud default configuration for ‘Security Updates’, then all you need to do is reboot.
RunCloud’s default ‘Security Update’ setting means you can worry a little bit less.
You can reboot your server from within your cloud provider’s settings panel.
Alternatively, you can log in to your server using SSH and run the following command with root privileges.
If you are logged in as root user then:
If you are logged in as a superuser then:
If, for some reason, you changed the default ‘Security Update’ settings and disabled automatic security updates (sigh), then update the server manually.
To do that, run the following command with root privileges. Once the updates are complete, reboot the server using the commands above.
sudo apt-get update && sudo apt-get upgrade
Before you reboot your server, it’s advisable to choose an appropriate downtime, and inform your users in advance before doing so.
Confirm your Servers are safe
Run the following command to confirm your kernel has been patched with the latest security fix:
If your kernel version is equal to or greater than 4.4.0-109-generic, then your server is safe.
That is all for now, until next time.