Important Notice: CloudMQTT is shutting down. Read all about it in our End of Life Announcement

Information regarding Spectre and Meltdown

Written by Carl Hörberg

You’re protected and no action is needed from your side. AWS have apply patches to protect VM-to-VM attacks and there’s no way for users to exploit these bugs from within our servers.

These bugs are not possible to exploit

Our guest VM does not have to be restarted with new kernel patches (whenever they become available), because no user can execute code on neither our dedicated plans or shared plans so there’s no way to exploit these bugs.

You can read more detailed information about these two security bugs that are affecting most of today's computers here: https://spectreattack.com/

AWS were able to patch their host machines without affecting the running instances.