Update: 24th July 2018:
I have updated the list of vendor responses below to include further Red Hat versions and CentOS:
Red Hat Enterprise Linux 6:
Red Hat Enterprise Linux 5 and 7:
On Wednesday of last week, a further vulnerability affecting Intel CPUs (defined) was disclosed.
TL;DR: Keep your operating system up to date and you should be fine.
What makes this vulnerability noteworthy?
According to Intel’s security advisory; this is an information disclosure issue. Similar to Spectre/Meltdown the flaw is the result of a performance optimization (used when saving and restoring the current state of applications as a system switches from one application to another). A feature known as Lazy Floating Point (defined) Unit (FPU) is used to save and restore registers (defined) within the CPU used to store floating point numbers (non-integers numbers, namely decimal numbers).
The issue is that these registers may be accessed by another application on the same system. If the registers are storing for example results of performing cryptographic equations for a key you have just created or used to decrypt data, the attacker could use this data to infer what the actual key is. The same applies for any type of data the registers store; that data can be used to infer what the previous contents were via a speculative execution side channel.
This vulnerability has been rated as moderate since it is difficult to exploit via a web browser (in contrast to Spectre) and the updates will be a software update only; no microcode (defined) and/or firmware (defined) updates will be necessary. With exploitation via a web browser being difficult; this vulnerability will likely instead be exploited from the victim system (at attacker will need to have already compromised your system).
How can I protect myself from this vulnerability?
Please note; AMD CPUs are NOT affected by this vulnerability.
The following vendors have responded to this vulnerability with software updates now in progress. Separately Red Hat has completed their updates for Red Hat Linux 5, 6 and 7 (with further applicable updates still in progress).
Other vendors responses are listed below. Thank you:
Apple (currently release notes for an update to macOS to resolve the vulnerability)