Important Notice: CloudKarafka is shutting down. Read all about it in our End of Life Announcement

Information regarding Spectre and Meltdown

Written by Carl Hörberg

You’re protected and no action is needed from your side. Cloud platforms will or have apply patches to protect VM-to-VM attacks and there’s no way for users to exploit these bugs from within our servers.

These bugs are not possible to exploit

Our guest VM does not have to be restarted with new kernel patches (whenever they become available), because no user can execute code on neither our dedicated plans or shared plans so there’s no way to exploit these bugs.

You can read more detailed information about these two security bugs that are affecting most of today's computers here: https://spectreattack.com/

AWS and GCE were able to patch their host machines without affecting the running instances. Azure and Softlayer restarted all their host machines the past couple of days. DigitalOcean and Rackspace are still not patched but will probably be during the 9th of January.

Patched and didn’t require a host machine restart

AWS: https://aws.amazon.com/security/security-bulletins/AWS-2018-013/
GCE: https://blog.google/topics/google-cloud/answering-your-questions-about-meltdown-and-spectre/

Patched and restarted host machines

Azure: https://azure.microsoft.com/en-us/blog/securing-azure-customers-from-cpu-vulnerability/
IBM Cloud: https://www.ibm.com/cloud/blog/ibm-cloud-spectre-meltdown-vulnerabilities

Not yet patched

DigitalOcean: https://blog.digitalocean.com/a-message-about-intel-security-findings/
Rackspace: https://blog.rackspace.com/rackspace-is-tracking-vulnerabilities-affecting-processors-by-intel-amd-and-arm