Customers may be aware of a severe hardware bug within Intel, AMD & ARM chips that allows an unauthorized process access to privileged memory. Please follow the links at the bottom of this notification for more details about the bug.
EXN uses Intel chips throughout our VMware vDC environment and as such, we will be installing a security patch (VMSA-2018-0002) during the hours mentioned below. Due to the nature and build of our VMware environment and unlike some other public clouds, Virtual Machines will not be affected by this maintenance, EXN engineers will gracefully migrate all VMs off each host before installing the patch, and rebooting the hosts. As each cluster will be running at a lower level of redundancy during each host reboot, this maintenance should be treated as "AT RISK".
Due to the large number of hosts in both our GS2 and ENF platforms, a long maintenance window has been announced, however the actual reboot time per host will be relatively low.
We also recommend all customers to update their VM operating systems, some OSes have updates available, others are still pending. If you have a fully managed service with EXN we will be contacting you shortly to discuss your options.
Location: Global Switch 2, Virtus Enfield
Start: 04/01/2018 - 22:00 GMT (UTC +0)
End: 05/01/2018 - 06:00 GMT (UTC +0)
Affected Services: VMware vDC (Virtual Machines)
Reason: Security Patch - VMSA-2018-0002 (CVE-2017-5753, CVE-2017-5715, and CVE-2017-5754)
Classification: At Risk
Rollback plan: Remove Patches