You’re protected and no action is needed from your side. AWS have apply patches
to protect VM-to-VM attacks and there’s no way for
users to exploit these bugs from within our servers.
These bugs are not possible to exploit
Our guest VM does not have to be restarted with new kernel patches (whenever they become available), because no user can execute code on neither our dedicated plans or shared plans so there’s no way to exploit these bugs.
You can read more detailed information about these two security bugs that are affecting most of today's computers here: https://spectreattack.com/
AWS were able to patch their host machines without affecting the running instances.