The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Intel Processors: memory reading via Meltdown

Synthesis of the vulnerability 

When the system uses an Intel processor, a local attacker can access to the kernel memory, in order to read sensitive information.
Impacted products: SNS, iOS by Apple, iPhone, Mac OS X, Blue Coat CAS, Broadcom Content Analysis, Cisco ASR, Cisco Catalyst, Nexus by Cisco, NX-OS, Cisco Router, Cisco UCS, XenServer, Debian, Avamar, ExtremeXOS, Summit, BIG-IP Hardware, TMOS, FortiAnalyzer, FortiGate, FortiManager, FortiOS, FreeBSD, Android OS, AIX, IBM i, QRadar SIEM, Juniper J-Series, Junos OS, Junos Space, NSMXpress, Linux, McAfee Email Gateway, McAfee NSM, McAfee NTBA, McAfee Web Gateway, Meinberg NTP Server, Edge EdgeHTML, IE, SQL Server, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows (platform) ~ not comprehensive, Windows RT, OpenBSD, openSUSE Leap, Oracle Communications, Solaris, pfSense, RealPresence Collaboration Server, RealPresence Distributed Media Application, RealPresence Resource Manager, RHEL, SIMATIC, Slackware, Sonus SBC, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Synology DS***, Synology RS***, Ubuntu, Unix (platform) ~ not comprehensive, vCenter Server, Xen.
Severity of this bulletin: 2/4.
Creation date: 03/01/2018.
Revision date: 05/01/2018.
Références of this threat: 2016636, 519675, ADV180002, CERTFR-2018-ALE-001, CERTFR-2018-AVI-004, CERTFR-2018-AVI-005, CERTFR-2018-AVI-009, CERTFR-2018-AVI-012, CERTFR-2018-AVI-014, CERTFR-2018-AVI-017, CERTFR-2018-AVI-018, CERTFR-2018-AVI-029, CERTFR-2018-AVI-048, CERTFR-2018-AVI-049, CERTFR-2018-AVI-077, CERTFR-2018-AVI-079, CERTFR-2018-AVI-114, CERTFR-2018-AVI-124, CERTFR-2018-AVI-134, CERTFR-2018-AVI-208, CERTFR-2018-AVI-225, CERTFR-2019-AVI-242, CERTFR-2019-AVI-489, cisco-sa-20180104-cpusidechannel, cpuapr2019, cpuapr2020, CTX231390, CTX231399, CTX234679, CVE-2017-5754, DLA-1232-1, DLA-1349-1, DSA-2018-049, DSA-4078-1, DSA-4082-1, DSA-4120-1, DSA-4120-2, DSA-4179-1, FG-IR-18-002, FreeBSD-SA-18:03.speculative_execution, HT208331, HT208334, HT208394, HT208465, JSA10842, JSA10873, K91229003, MBGSA-1801, Meltdown, N1022433, nas8N1022433, openSUSE-SU-2018:0022-1, openSUSE-SU-2018:0023-1, openSUSE-SU-2018:0326-1, openSUSE-SU-2018:0459-1, openSUSE-SU-2018:1623-1, RHSA-2018:0007-01, RHSA-2018:0008-01, RHSA-2018:0009-01, RHSA-2018:0010-01, RHSA-2018:0011-01, RHSA-2018:0012-01, RHSA-2018:0013-01, RHSA-2018:0014-01, RHSA-2018:0015-01, RHSA-2018:0016-01, RHSA-2018:0017-01, RHSA-2018:0018-01, RHSA-2018:0020-01, RHSA-2018:0021-01, RHSA-2018:0022-01, RHSA-2018:0023-01, RHSA-2018:0024-01, RHSA-2018:0025-01, RHSA-2018:0026-01, RHSA-2018:0027-01, RHSA-2018:0028-01, RHSA-2018:0029-01, RHSA-2018:0030-01, RHSA-2018:0031-01, RHSA-2018:0032-01, RHSA-2018:0034-01, RHSA-2018:0035-01, RHSA-2018:0036-01, RHSA-2018:0037-01, RHSA-2018:0038-01, RHSA-2018:0039-01, RHSA-2018:0040-01, RHSA-2018:0053-01, RHSA-2018:0093-01, RHSA-2018:0094-01, RHSA-2018:0103-01, RHSA-2018:0104-01, RHSA-2018:0105-01, RHSA-2018:0106-01, RHSA-2018:0107-01, RHSA-2018:0108-01, RHSA-2018:0109-01, RHSA-2018:0110-01, RHSA-2018:0111-01, RHSA-2018:0112-01, RHSA-2018:0182-01, RHSA-2018:0292-01, RHSA-2018:0464-01, RHSA-2018:0496-01, RHSA-2018:0512-01, RHSA-2018:1129-01, RHSA-2018:1196-01, SA161, SB10226, spectre_meltdown_advisory, SSA-168644, SSA:2018-016-01, SSA:2018-037-01, SSA-608355, STORM-2018-001, SUSE-SU-2018:0010-1, SUSE-SU-2018:0011-1, SUSE-SU-2018:0012-1, SUSE-SU-2018:0031-1, SUSE-SU-2018:0040-1, SUSE-SU-2018:0069-1, SUSE-SU-2018:0115-1, SUSE-SU-2018:0131-1, SUSE-SU-2018:0171-1, SUSE-SU-2018:0219-1, SUSE-SU-2018:0438-1, SUSE-SU-2018:0472-1, SUSE-SU-2018:0601-1, SUSE-SU-2018:0609-1, SUSE-SU-2018:0638-1, SUSE-SU-2018:0678-1, SUSE-SU-2018:0909-1, SUSE-SU-2018:1603-1, SUSE-SU-2018:1658-1, SUSE-SU-2018:1699-1, SUSE-SU-2018:2528-1, Synology-SA-18:01, USN-3516-1, USN-3522-1, USN-3522-2, USN-3522-3, USN-3522-4, USN-3523-1, USN-3523-2, USN-3523-3, USN-3524-1, USN-3524-2, USN-3525-1, USN-3540-1, USN-3540-2, USN-3541-1, USN-3541-2, USN-3583-1, USN-3583-2, USN-3597-1, USN-3597-2, VIGILANCE-VUL-24933, VMSA-2018-0007, VN-2018-001, VN-2018-002, VU#584653, XSA-254.

Description of the vulnerability 

When the system uses an Intel processor, a local attacker can access to the kernel memory, in order to read sensitive information.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This threat impacts software or systems such as SNS, iOS by Apple, iPhone, Mac OS X, Blue Coat CAS, Broadcom Content Analysis, Cisco ASR, Cisco Catalyst, Nexus by Cisco, NX-OS, Cisco Router, Cisco UCS, XenServer, Debian, Avamar, ExtremeXOS, Summit, BIG-IP Hardware, TMOS, FortiAnalyzer, FortiGate, FortiManager, FortiOS, FreeBSD, Android OS, AIX, IBM i, QRadar SIEM, Juniper J-Series, Junos OS, Junos Space, NSMXpress, Linux, McAfee Email Gateway, McAfee NSM, McAfee NTBA, McAfee Web Gateway, Meinberg NTP Server, Edge EdgeHTML, IE, SQL Server, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows (platform) ~ not comprehensive, Windows RT, OpenBSD, openSUSE Leap, Oracle Communications, Solaris, pfSense, RealPresence Collaboration Server, RealPresence Distributed Media Application, RealPresence Resource Manager, RHEL, SIMATIC, Slackware, Sonus SBC, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Synology DS***, Synology RS***, Ubuntu, Unix (platform) ~ not comprehensive, vCenter Server, Xen.

Our Vigil@nce team determined that the severity of this computer threat is medium.

The trust level is of type confirmed by the editor, with an origin of user shell.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a specialist ability can exploit this cybersecurity bulletin.

Solutions for this threat 

Processors: solution for Meltdown/Spectre.
Specific solution are attached to vulnerability bulletins.

Apple iOS: version 11.2.
The version 11.2 is fixed.

Apple macOS: solution (07/12/2017).
The solution is indicated in information sources.

Apple macOS: solution (24/01/2018).
The solution is indicated in information sources.

Cisco: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Citrix XenServer: patch.
A patch is indicated in information sources.

Citrix XenServer: patch for Meltdown/Spectre.
A patch is indicated in information sources.

Debian 7: new linux packages.
New packages are available:
  Debian 7: linux 3.2.96-3

Debian 8: new linux packages (10/01/2018).
New packages are available:
  Debian 8: linux 3.16.51-3+deb8u1

Debian 9: new linux packages.
New packages are available:
  Debian 9: linux 4.9.65-3+deb9u2

Debian: new linux-image packages.
New packages are available:
  Debian 9: linux-image 4.9.82-1+deb9u3

EMC Avamar: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Extreme Networks: solution for Meltdown/Spectre.
The solution is indicated in information sources.

F5 BIG-IP: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Fortinet: solution for Meltdown/Spectre.
Fixed versions are indicated in information sources.

FreeBSD: patch for Meltdown/Spectre.
A patch is available:
  https://security.FreeBSD.org/patches/SA-18:03/speculative_execution-amd64-11.patch

FreeBSD: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Google Android/Pixel: patch for April 2018.
A patch is indicated in information sources.

Google Android/Pixel: patch for December 2018.
A patch is indicated in information sources.

Google Android/Pixel: patch for January 2018.
A patch is indicated in information sources.

Google Android/Pixel: patch for March 2018.
A patch is indicated in information sources.

Google Android/Pixel: patch for May 2018.
A patch is indicated in information sources.

Google Android/Pixel: patch for September 2018.
A patch is indicated in information sources.

IBM AIX: patch for Spectre/Meltdown.
A patch is available:
  http://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar

IBM i: solution for Spectre/Meltdown.
The solution is indicated in information sources.

IBM QRadar SIEM: patch for Spectre/Meltdown.
A patch is indicated in information sources.

Juniper: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Junos Space: solution.
The solution is indicated in information sources.

Linux kernel: patch for Meltdown/Spectre.
A patch is indicated in information sources.

Linux kernel: version 3.16.56.
The version 3.16.56 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v3.x/

Linux kernel: version 3.2.101.
The version 3.2.101 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v3.x/

Linux kernel: version 4.14.11.
The version 4.14.11 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/

Linux kernel: version 4.14.20.
The version 4.14.20 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/linux-4.14.20.tar.xz

Linux kernel: version 4.15.4.
The version 4.15.4 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/linux-4.15.4.tar.xz

Linux kernel: version 4.4.112.
The version 4.4.112 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/

Linux kernel: version 4.9.77.
The version 4.9.77 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/

McAfee: patch for Spectre/Meltdown.
A patch is available:
  https://kc.mcafee.com/corporate/index?page=content&id=KB56057

Meinberg: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Microsoft: solution for Meltdown/Spectre.
The solution is indicated in information sources.

OpenBSD 6: patch for Meltdown.
A patch is indicated in information sources.

openSUSE Leap 15.0: new xen packages.
New packages are available:
  openSUSE Leap 15.0: xen 4.10.1_04-lp150.2.3.1

openSUSE Leap 42.3: new xen packages (16/02/2018).
New packages are available:
  openSUSE Leap 42.3: xen 4.9.1_08-16.1

openSUSE Leap: new kernel packages.
New packages are available:
  openSUSE Leap 42.2: kernel 4.4.104-18.44.1
  openSUSE Leap 42.3: kernel 4.4.104-39.1

openSUSE Leap: new webkit2gtk3 packages (01/02/2018).
New packages are available, as indicated in information sources.

Oracle Communications: CPU of April 2019.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2518758.1
  https://support.oracle.com/rs?type=doc&id=2518763.1
  https://support.oracle.com/rs?type=doc&id=2522151.1
  https://support.oracle.com/rs?type=doc&id=2519787.1
  https://support.oracle.com/rs?type=doc&id=2522126.1
  https://support.oracle.com/rs?type=doc&id=2522123.1
  https://support.oracle.com/rs?type=doc&id=2518753.1
  https://support.oracle.com/rs?type=doc&id=2522121.1
  https://support.oracle.com/rs?type=doc&id=2528862.1
  https://support.oracle.com/rs?type=doc&id=2518754.1

Oracle Solaris: CPU of April 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2650589.1

pfSense: version 2.4.3.
The version 2.4.3 is fixed:
  https://www.netgate.com/

Polycom: solution for Meltdown/Spectre.
The solution is indicated in information sources.

RHEL 5.9: new kernel packages.
New packages are available:
  RHEL 5: kernel 2.6.18-348.35.1.el5

RHEL: new packages for Meltdown/Spectre.
New packages are available, as indicated in information sources.

Siemens SIMATIC: solution for Spectre, Meltdown.
Some countermeasures are stated in information sources.

SIMATIC WinAC RTX F 2010: workaround for Processor.
A workaround is indicated in the information source.

Slackware: new kernel packages.
New packages are available:
  Slackware 14.0: kernel 3.2.98-i586-1, kernel-firmware 20180104_65b1c68-1
  Slackware 14.2: kernel-generic 4.4.115-1, kernel-firmware 20180201_2aa2ac2-1

Sonus Session Border Controller: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Stormshield: solution for Meltdown/Spectre.
The solution is indicated in information sources.

SUSE LE 11 SP3: new kernel packages (09/01/2018).
New packages are available:
  SUSE LE 11 SP3: kernel 3.0.101-0.47.106.11.1

SUSE LE 11 SP3: new xen packages (15/03/2018).
New packages are available:
  SUSE LE 11 SP3: xen 4.2.5_21-45.19.1

SUSE LE 11 SP3: new xen packages (27/08/2018).
New packages are available:
  SUSE LE 11 SP3: xen 4.2.5_21-45.25.1

SUSE LE 11 SP4: new kernel packages (04/01/2018).
New packages are available:
  SUSE LE 11 SP4: kernel 3.0.101-108.21.1

SUSE LE 11 SP4: new xen packages (09/03/2018).
New packages are available:
  SUSE LE 11 SP4: xen 4.4.4_28-61.23.2

SUSE LE 11 SP4: new xen packages (11/06/2018).
New packages are available:
  SUSE LE 11 SP4: xen 4.4.4_32-61.29.2

SUSE LE 12 RTM: new kernel packages (17/01/2018).
New packages are available:
  SUSE LE 12 RTM: kernel 3.12.61-52.111.1

SUSE LE 12 RTM: new xen packages (06/03/2018).
New packages are available:
  SUSE LE 12 RTM: xen 4.4.4_28-22.62.1

SUSE LE 12 RTM: new xen packages (13/06/2018).
New packages are available:
  SUSE LE 12 RTM: xen 4.4.4_32-22.68.1

SUSE LE 12 SP1: new kernel packages (08/01/2018).
New packages are available:
  SUSE LE 12 SP1: kernel 3.12.74-60.64.69.1

SUSE LE 12 SP1: new xen packages (06/03/2018).
New packages are available:
  SUSE LE 12 SP1: xen 4.5.5_24-22.43.1

SUSE LE 12 SP2: new kernel packages.
New packages are available:
  SUSE LE 12 SP2: kernel 4.4.103-92.59.1

SUSE LE 12 SP2: new xen packages (11/04/2018).
New packages are available:
  SUSE LE 12 SP2: xen 4.7.5_02-43.27.1

SUSE LE 12 SP2: new xen packages (18/06/2018).
New packages are available:
  SUSE LE 12 SP2: xen 4.7.5_04-43.33.1

SUSE LE 12 SP2: new xen packages (19/02/2018).
New packages are available:
  SUSE LE 12 SP2: xen 4.7.4_06-43.24.1

SUSE LE 12 SP3: new kernel packages.
New packages are available:
  SUSE LE 12 SP3: kernel 4.4.103-6.38.1

SUSE LE 12 SP3: new webkit2gtk3 packages.
New packages are available, as indicated in information sources.

SUSE LE 12 SP3: new xen packages.
New packages are available:
  SUSE LE 12 SP3: xen 4.9.1_08-3.26.1

Symantec Content and Malware Analysis: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Synology: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Ubuntu 12.04: new linux-image-3.2.0 packages.
New packages are available:
  Ubuntu 12.04 ESM: linux-image-generic 3.2.0.132.146

Ubuntu: new firefox packages.
New packages are available:
  Ubuntu 17.10: firefox 57.0.4+build1-0ubuntu0.17.10.1
  Ubuntu 17.04: firefox 57.0.4+build1-0ubuntu0.17.04.1
  Ubuntu 16.04 LTS: firefox 57.0.4+build1-0ubuntu0.16.04.1
  Ubuntu 14.04 LTS: firefox 57.0.4+build1-0ubuntu0.14.04.1

Ubuntu: new linux-image-3.13.0 packages.
New packages are available:
  Ubuntu 12.04 ESM: linux-image-generic-lts-trusty 3.13.0.139.129
  Ubuntu 14.04 LTS: linux-image-generic 3.13.0.139.148

Ubuntu: new linux-image-3.13 packages.
New packages are available:
  Ubuntu 14.04 LTS: linux-image-3.13.0-142-generic-lpae 3.13.0-142.191
  Ubuntu 12.04 ESM: linux-image-3.13.0-142-generic-lpae 3.13.0-142.191~precise1

Ubuntu: new linux-image-4.13.0 packages (10/01/2018).
New packages are available:
  Ubuntu 16.04 LTS: linux-image-generic-hwe-16.04 4.13.0.26.46
  Ubuntu 17.10: linux-image-generic 4.13.0.25.26

Ubuntu: new linux-image-4.13.0 packages (23/01/2018).
New packages are available:
  Ubuntu 16.04 LTS: linux-image-4.13.0-31-generic 4.13.0-31.34~16.04.1
  Ubuntu 17.10: linux-image-4.13.0-31-generic 4.13.0-31.34

Ubuntu: new linux-image-4.4.0 packages.
New packages are available:
  Ubuntu 14.04 LTS: linux-image-generic-lts-xenial 4.4.0.109.114
  Ubuntu 16.04 LTS: linux-image-generic 4.4.0.109.114

VMware vCenter Server: fixed versions for Spectre/Meltdown.
The following versions are fixed:
  vCSA version 6.5 Update 1f

Wind River Linux: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Xen: solution for Meltdown/Spectre.
The solution is indicated in information sources.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a software vulnerabilities announce. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.