Spectre and Meltdown – CPU security bug


We are aware of the news surrounding the hardware-level Intel bug and we will continue to support our customers through this issue and will relay updated information as soon as it becomes available.

Please review the following Q&A :

Q: What is the source of the vulnerability?

A: Intel hardware design flaw that affects all of the latest Intel x86-64 chipsets. Unfortunately there is no fix on a microcode level, so the fix will be implemented in particular operating systems. MITRE CVE-2017-5715CVE-2017-5753and CVE-2017-5754. Here is the detailed description of vulnerabilities https://spectreattack.com/

Q:What operating systems are affected?
A: All operating systems are affected, the whole Linux family, Windows and MacOS.

Q: How should I plan for the update?
A: Fix for this will require a server reboot. Please plan maintenance windows and notify customers about upcoming maintenance.

The Linux community has committed the official patch to mainstream kernel. This patch Kernel Page Table Isolation, or KPTI is big and it will take few days to be adopted by mainstream Linux distributions.

Virtualizor Team.