Rackspace Public Cloud OS mitigations against CPU speculative execution vulnerabilities

  • Last updated on: 2018-08-20
  • Authored by: Marc Nourani

Rackspace continues to evaluate and address a set of speculative execution vulnerabilities affecting certain CPU. You can find more information about the vulnerabilities in the following locations:

Spectre and Meltdown

Details related to the vulnerabilities can be found in:

Spectre and Meltdown variants 3A and 4 (May 21, 2018)

Details related to the vulnerabilities can be found in:

L1 Terminal Fault (L1TF) or Foreshadow (August 14, 2018)

Details related to the vulnerabilities can be found in:

The vast majority of our infrastructure is NOT vulnerable and the remaining threat vectors are minimal. For security reasons, we can’t disclose the exact nature of those vectors but they are aligned with similar industry-leading cloud providers.

To date, remediation has been done consciously with non-impacting mitigations. While new information from our upstream vendors could alter this stance, we do not anticipate impactful action to our customers associated with remediation of these vulnerabilities.

We continue to work with our vendors as they iterate on their patches to improve the level of security and stability of our environment. With this approach, we are working to avoid multiple impacts to customer environments. If we need to take action that would impact customers, we will provide additional guidance directly to the customers involved.

Operating System-Specific guidance

Windows information and Linux information are posted on other pages within the Rackspace Support Network.

Rackspace has provided additional guidance directly to Managed Operations customers on Rackspace Public Cloud.

We suggest that Managed Infrastructure customers on Rackspace Public Cloud follow guidance provided by the applicable operating system vendor.

Share this information: