Note about Meltdown/Spectre vulnerabilities
cloud.gov is tracking the recent public disclosure of vulnerabilities in modern CPUs, named the Meltdown and Spectre attacks. We are taking all available steps to mitigate the impact of these vulnerabilities. No customer action is required.
Our cloud infrastructure provider has already updated their systems so that cloud.gov customer applications are not vulnerable to Meltdown attacks from other tenants in AWS GovCloud.
When an update for the platform operating system is released, we will apply it. This will prevent Meltdown attacks between customer applications within cloud.gov. We use Ubuntu, which plans to release an update very soon. Then the Cloud Foundry team will release a CF-customized version, and we will apply the update to cloud.gov. This will be routine maintenance with no expected downtime.
We expect to have this update complete on or before the public release of proof-of-concept Meltdown exploit code on January 9.
There is no immediate remedy for Spectre attacks for any cloud service provider. Everyone must upgrade their operating system and browsers to protect from all websites on the internet.
We will update this note as the release process progresses. If you have questions, email us at firstname.lastname@example.org.
Update (January 9, 2018, 11 pm ET): Ubuntu has released an update with the relevant patches. We expect Cloud Foundry to released a CF-customized version in the next day, and we will apply the update when available.
Update (January 10, 2018, 11 am ET): Cloud Foundry released their version of Ubuntu with the Meltdown patches at 12:33 a.m. ET this morning. We are updating the development and staging environments of cloud.gov and testing this release, then we will proceed with our production update later today. This will be routine maintenance with no expected downtime.
Update (January 11, 2018, 5 pm ET): We’ve completed production deployment of the Cloud Foundry version of Ubuntu with initial Meltdown patches. Ubuntu and Cloud Foundry continue to release updates with additional patches, and we’re following our standard deployment process as they become available.