This week Intel publicly disclosed a group of processor vulnerabilities known as Microarchitectural Data Sampling (MDS), also referred to as “ZombieLoad”. MDS affects systems that host virtual machines from varying security domains and/or that the system owner does not fully trust, which includes Linode’s infrastructure and Linodes themselves. This guide has additional detailed information on these vulnerabilities as well as their mitigation.
We’ve started mitigation efforts and anticipate full mitigation of our fleet in the coming weeks. These mitigation efforts may require interruption to your running systems, but we will clearly communicate any scheduled maintenance or coordination required by our customers via Support ticket.
To address these vulnerabilities on your end, we’ve released a new kernel (5.1.2) with mitigations in place, so make sure you select this kernel in your Linode’s configuration profile, then reboot. If you are using a distribution-supplied kernel, you will need to upgrade your kernel accordingly. As always, you should also ensure your Linode is up to date and secured.
We’ll keep you updated here in the coming weeks as we proceed with our mitigation efforts.