Critical Maintenance for CPU Vulnerabilities (Meltdown)

  • Sunday, 11th February, 2018
  • 19:21pm


A number of serious security vulnerabilities affecting multiple CPU architectures were recently disclosed by Google's Project Zero team. In order to address the disclosed vulnerabilities, the physical hardware on which your server resides will need to undergo maintenance. This is the first of several separate maintenances that will be necessary to fully mitigate these vulnerabilities. This maintenance specifically patches the Meltdown vulnerability; the Spectre vulnerability will be addressed in a future maintenance cycle. We will inform you of these maintenance cycles via additional tickets.

These updates affect the underlying infrastructure that your VServer resides on and will not affect the data stored within your VServer. To further protect your VServer, we strongly recommend that you verify it is configured to boot using our latest kernel, which includes patches to help address these vulnerabilities. If your VServer's Configuration Profile is set to utilize our latest kernel, your kernel will automatically be updated upon rebooting.

During the maintenance window, your VServer will be cleanly shut down and will be unavailable while we perform the updates. A two-hour window is allocated, however the actual downtime should be much less. After the maintenance has concluded, each VServer will be returned to its last state (running or powered off).

We regret the short notice and the downtime required for this maintenance. However, due to the severity of these vulnerabilities, we have no choice but to take swift and immediate action to ensure the safety and security of our customers. For these reasons, we must adhere to a strict timetable, and will not be able to reschedule or defer this maintenance.

Expected Scheduled Time: 14/02/2012 @13:00 Hrs [IST]
Expected Maximum Down Time: 120 Minutes.
« Back