You may have heard of terms like Meltdown and Spectre in recent tech news. Both exhibit a hardware vulnerability exposed by a small team in Austria. Through software, both are able to access private data on a server, but how is this possible? The vulnerability begins at the most inner core of a computer, the Central Processing Unit (CPU). By observing micro processes and transactions, these programs were able to access other parts of the computer that may not be relevant to the actual programs running. For instance, e-mails, files, browsing history, etc. were all subject to vulnerability. While the technical understanding of Meltdown and Spectre is extremely high level, it is important to understand that our upstream provider took immediate action.
Our upstream provider kept up to date with all Linux distributions and their kernel updates that would directly target Meltdown and Spectre. Fortunately, they able to update our Linux machines immediately and efficiently to ensure that all data is secure.