The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Processors: memory reading via Spectre Bounds Check

Synthesis of the vulnerability 

A local attacker can access to the kernel memory, in order to read sensitive information.
Vulnerable products: SNS, iOS by Apple, Mac OS X, Blue Coat CAS, Broadcom Content Analysis, Cisco ASR, Cisco Catalyst, Nexus by Cisco, NX-OS, Cisco Router, Cisco UCS, XenServer, Debian, ConnectPort TSx, Avamar, ExtremeXOS, Summit, BIG-IP Hardware, TMOS, Fedora, FortiAnalyzer, FortiGate, FortiManager, FortiOS, FreeBSD, Android OS, Chrome, AIX, IBM i, QRadar SIEM, Juniper J-Series, Junos OS, Junos Space, NSMXpress, Linux, McAfee Email Gateway, McAfee NSM, McAfee NTBA, McAfee Web Gateway, Meinberg NTP Server, Edge EdgeHTML, IE, SQL Server, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows (platform) ~ not comprehensive, Windows RT, Firefox, openSUSE Leap, Opera, Oracle Communications, Solaris, RealPresence Collaboration Server, RealPresence Distributed Media Application, RealPresence Resource Manager, RHEL, SIMATIC, Sonus SBC, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Synology DS***, Synology RS***, Ubuntu, Unix (platform) ~ not comprehensive, ESXi, vCenter Server, VMware vSphere, VMware vSphere Hypervisor, VMware Workstation, Xen.
Severity of this weakness: 1/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 05/01/2018.
Revision date: 21/02/2018.
Références of this bulletin: 2016636, 519675, ADV180002, bulletinjan2018, bulletinjul2018, CERTFR-2018-AVI-004, CERTFR-2018-AVI-005, CERTFR-2018-AVI-006, CERTFR-2018-AVI-008, CERTFR-2018-AVI-009, CERTFR-2018-AVI-012, CERTFR-2018-AVI-013, CERTFR-2018-AVI-014, CERTFR-2018-AVI-016, CERTFR-2018-AVI-027, CERTFR-2018-AVI-029, CERTFR-2018-AVI-032, CERTFR-2018-AVI-048, CERTFR-2018-AVI-049, CERTFR-2018-AVI-077, CERTFR-2018-AVI-079, CERTFR-2018-AVI-094, CERTFR-2018-AVI-114, CERTFR-2018-AVI-124, CERTFR-2018-AVI-134, CERTFR-2018-AVI-208, CERTFR-2018-AVI-256, CERTFR-2018-AVI-365, CERTFR-2018-AVI-584, CERTFR-2019-AVI-042, CERTFR-2019-AVI-052, CERTFR-2019-AVI-131, CERTFR-2019-AVI-242, CERTFR-2019-AVI-361, CERTFR-2019-AVI-458, CERTFR-2019-AVI-489, CERTFR-2020-AVI-051, cisco-sa-20180104-cpusidechannel, cpuapr2018, cpuapr2019, cpujul2020, CTX231390, CTX231399, CVE-2017-5753, CVE-2018-3693, DLA-1422-1, DLA-1422-2, DLA-1423-1, DLA-1424-1, DLA-1434-1, DLA-1731-1, DLA-1731-2, DSA-2018-049, DSA-4187-1, DSA-4188-1, FEDORA-2018-21a7ad920c, FEDORA-2018-276558ff6f, FEDORA-2018-6b319763ab, FEDORA-2018-7e17849364, FEDORA-2018-e6fe35524d, FEDORA-2018-fb582aabcc, FG-IR-18-002, HT208397, HT208401, ibm10742755, INTEL-OSS-10002, JSA10842, JSA10873, JSA10917, K91229003, MBGSA-1801, MFSA-2018-01, N1022433, nas8N1022433, openSUSE-SU-2018:0022-1, openSUSE-SU-2018:0023-1, openSUSE-SU-2018:0326-1, openSUSE-SU-2018:0459-1, openSUSE-SU-2018:1623-1, openSUSE-SU-2018:2119-1, RHSA-2018:0007-01, RHSA-2018:0008-01, RHSA-2018:0009-01, RHSA-2018:0010-01, RHSA-2018:0011-01, RHSA-2018:0012-01, RHSA-2018:0013-01, RHSA-2018:0014-01, RHSA-2018:0015-01, RHSA-2018:0016-01, RHSA-2018:0017-01, RHSA-2018:0018-01, RHSA-2018:0020-01, RHSA-2018:0021-01, RHSA-2018:0022-01, RHSA-2018:0023-01, RHSA-2018:0024-01, RHSA-2018:0025-01, RHSA-2018:0026-01, RHSA-2018:0027-01, RHSA-2018:0028-01, RHSA-2018:0029-01, RHSA-2018:0030-01, RHSA-2018:0031-01, RHSA-2018:0032-01, RHSA-2018:0034-01, RHSA-2018:0035-01, RHSA-2018:0036-01, RHSA-2018:0037-01, RHSA-2018:0038-01, RHSA-2018:0039-01, RHSA-2018:0040-01, RHSA-2018:0053-01, RHSA-2018:0093-01, RHSA-2018:0094-01, RHSA-2018:0103-01, RHSA-2018:0104-01, RHSA-2018:0105-01, RHSA-2018:0106-01, RHSA-2018:0107-01, RHSA-2018:0108-01, RHSA-2018:0109-01, RHSA-2018:0110-01, RHSA-2018:0111-01, RHSA-2018:0112-01, RHSA-2018:0182-01, RHSA-2018:0292-01, RHSA-2018:0464-01, RHSA-2018:0496-01, RHSA-2018:0512-01, RHSA-2018:1129-01, RHSA-2018:1196-01, RHSA-2019:1946-01, RHSA-2020:0174-01, SA161, SB10226, Spectre, spectre_meltdown_advisory, SSA-168644, SSA-505225, SSA-608355, STORM-2018-001, SUSE-SU-2018:0011-1, SUSE-SU-2018:0012-1, SUSE-SU-2018:0031-1, SUSE-SU-2018:0040-1, SUSE-SU-2018:0069-1, SUSE-SU-2018:0113-1, SUSE-SU-2018:0114-1, SUSE-SU-2018:0115-1, SUSE-SU-2018:0131-1, SUSE-SU-2018:0171-1, SUSE-SU-2018:0219-1, SUSE-SU-2018:0438-1, SUSE-SU-2018:0472-1, SUSE-SU-2018:0601-1, SUSE-SU-2018:0609-1, SUSE-SU-2018:0638-1, SUSE-SU-2018:0678-1, SUSE-SU-2018:0909-1, SUSE-SU-2018:1368-1, SUSE-SU-2018:1376-1, SUSE-SU-2018:1603-1, SUSE-SU-2018:1658-1, SUSE-SU-2018:1699-1, SUSE-SU-2018:2150-1, SUSE-SU-2018:2528-1, SUSE-SU-2019:0222-1, SUSE-SU-2019:0765-1, SUSE-SU-2019:1550-1, SUSE-SU-2019:2430-1, Synology-SA-18:01, USN-3516-1, USN-3521-1, USN-3530-1, USN-3541-1, USN-3541-2, USN-3542-1, USN-3542-2, USN-3549-1, USN-3580-1, USN-3597-1, USN-3597-2, VIGILANCE-VUL-24948, VMSA-2018-0002, VMSA-2018-0004, VMSA-2018-0004.2, VMSA-2018-0004.3, VMSA-2018-0007, VN-2018-001, VN-2018-002, VU#584653, XSA-254.

Description of the vulnerability 

A local attacker can monitor the performances of its process, in order to get information about the data used for computing by the processor.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This vulnerability alert impacts software or systems such as SNS, iOS by Apple, Mac OS X, Blue Coat CAS, Broadcom Content Analysis, Cisco ASR, Cisco Catalyst, Nexus by Cisco, NX-OS, Cisco Router, Cisco UCS, XenServer, Debian, ConnectPort TSx, Avamar, ExtremeXOS, Summit, BIG-IP Hardware, TMOS, Fedora, FortiAnalyzer, FortiGate, FortiManager, FortiOS, FreeBSD, Android OS, Chrome, AIX, IBM i, QRadar SIEM, Juniper J-Series, Junos OS, Junos Space, NSMXpress, Linux, McAfee Email Gateway, McAfee NSM, McAfee NTBA, McAfee Web Gateway, Meinberg NTP Server, Edge EdgeHTML, IE, SQL Server, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows (platform) ~ not comprehensive, Windows RT, Firefox, openSUSE Leap, Opera, Oracle Communications, Solaris, RealPresence Collaboration Server, RealPresence Distributed Media Application, RealPresence Resource Manager, RHEL, SIMATIC, Sonus SBC, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Synology DS***, Synology RS***, Ubuntu, Unix (platform) ~ not comprehensive, ESXi, vCenter Server, VMware vSphere, VMware vSphere Hypervisor, VMware Workstation, Xen.

Our Vigil@nce team determined that the severity of this computer weakness alert is low.

The trust level is of type confirmed by the editor, with an origin of user shell.

This bulletin is about 2 vulnerabilities.

An attacker with a expert ability can exploit this computer vulnerability.

Solutions for this threat 

Processors: solution for Meltdown/Spectre.
Specific solution are attached to vulnerability bulletins.

Apple iOS: version 11.2.2.
The version 11.2.2 is fixed.

Apple macOS: version 10.13.2 Supplemental Update.
The version 10.13.2 Supplemental Update is fixed.

Cisco: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Citrix XenServer: patch for Meltdown/Spectre.
A patch is indicated in information sources.

Debian 8: new linux-4.9 packages.
New packages are available:
  Debian 8: linux-4.9 4.9.110-1~deb8u1

Debian 8: new linux packages (02/05/2018).
New packages are available:
  Debian 8: linux 3.16.56-1

Debian 8: new linux packages (16/07/2018).
New packages are available:
  Debian 8: linux 3.16.57-2

Debian 8: new linux packages (27/03/2019).
New packages are available:
  Debian 8: linux 3.16.64-2

Debian 9: new linux packages.
New packages are available:
  Debian 9: linux 4.9.88-1

DIGI ConnectPort TS: solution for Spectre.
The solution is indicated in information sources.

EMC Avamar: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Extreme Networks: solution for Meltdown/Spectre.
The solution is indicated in information sources.

F5 BIG-IP: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Fedora: new firefox packages.
New packages are available:
  Fedora 26: firefox 57.0.4-1.fc26
  Fedora 27: firefox 57.0.4-1.fc27

Fedora: new kernel packages.
New packages are available:
  Fedora 26: kernel 4.14.13-200.fc26
  Fedora 27: kernel 4.14.13-300.fc27

Fedora: new microcode_ctl packages.
New packages are available:
  Fedora 26: microcode_ctl 2.1-20.fc26
  Fedora 27: microcode_ctl 2.1-20.fc27

Firefox: version 57.0.4.
The version 57.0.4 is fixed:
  https://www.mozilla.org/

Fortinet: solution for Meltdown/Spectre.
Fixed versions are indicated in information sources.

FreeBSD: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Google Android/Pixel: patch for January 2018.
A patch is indicated in information sources.

Google Chrome: workaround for Meltdown/Spectre.
A workaround is indicated in the information source.

IBM AIX: patch for Spectre/Meltdown.
A patch is available:
  http://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar

IBM i: solution for Spectre/Meltdown.
The solution is indicated in information sources.

IBM QRadar SIEM: patch for Linux.
A patch is indicated in information sources.

IBM QRadar SIEM: patch for Spectre/Meltdown.
A patch is indicated in information sources.

Juniper: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Junos Space: solution.
The solution is indicated in information sources.

Junos Space: version 18.4R1.
The version 18.4R1 is fixed.

Linux kernel: patch for Meltdown/Spectre.
A patch is indicated in information sources.

Linux kernel: version 3.16.55.
The version 3.16.55 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v3.x/linux-3.16.55.tar.xz

Linux kernel: version 3.16.56.
The version 3.16.56 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v3.x/

Linux kernel: version 3.2.100.
The version 3.2.100 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v3.x/linux-3.2.100.tar.xz

Linux kernel: version 3.2.101.
The version 3.2.101 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v3.x/

Linux kernel: version 4.14.11.
The version 4.14.11 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/

Linux kernel: version 4.14.14.
The version 4.14.14 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/

Linux kernel: version 4.1.50.
The version 4.1.50 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/

Linux kernel: version 4.4.112.
The version 4.4.112 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/

Linux kernel: version 4.9.77.
The version 4.9.77 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/

McAfee: patch for Spectre/Meltdown.
A patch is available:
  https://kc.mcafee.com/corporate/index?page=content&id=KB56057

Meinberg: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Microsoft: solution for Meltdown/Spectre.
The solution is indicated in information sources.

NVIDIA Driver: solution for Meltdown/Spectre.
The solution is indicated in information sources.

openSUSE Leap 15.0: new kernel packages.
New packages are available:
  openSUSE Leap 15.0: kernel 4.12.14-lp150.12.7.1

openSUSE Leap 15.0: new xen packages.
New packages are available:
  openSUSE Leap 15.0: xen 4.10.1_04-lp150.2.3.1

openSUSE Leap 42.3: new xen packages (16/02/2018).
New packages are available:
  openSUSE Leap 42.3: xen 4.9.1_08-16.1

openSUSE Leap: new kernel packages.
New packages are available:
  openSUSE Leap 42.2: kernel 4.4.104-18.44.1
  openSUSE Leap 42.3: kernel 4.4.104-39.1

openSUSE Leap: new webkit2gtk3 packages (01/02/2018).
New packages are available, as indicated in information sources.

Oracle Communications: CPU of April 2019.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2518758.1
  https://support.oracle.com/rs?type=doc&id=2518763.1
  https://support.oracle.com/rs?type=doc&id=2522151.1
  https://support.oracle.com/rs?type=doc&id=2519787.1
  https://support.oracle.com/rs?type=doc&id=2522126.1
  https://support.oracle.com/rs?type=doc&id=2522123.1
  https://support.oracle.com/rs?type=doc&id=2518753.1
  https://support.oracle.com/rs?type=doc&id=2522121.1
  https://support.oracle.com/rs?type=doc&id=2528862.1
  https://support.oracle.com/rs?type=doc&id=2518754.1

Oracle Communications: CPU of July 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2681987.1
  https://support.oracle.com/rs?type=doc&id=2682459.1
  https://support.oracle.com/rs?type=doc&id=2682014.1
  https://support.oracle.com/rs?type=doc&id=2683787.1
  https://support.oracle.com/rs?type=doc&id=2683788.1
  https://support.oracle.com/rs?type=doc&id=2683789.1
  https://support.oracle.com/rs?type=doc&id=2682045.1
  https://support.oracle.com/rs?type=doc&id=2683831.1
  https://support.oracle.com/rs?type=doc&id=2682010.1
  https://support.oracle.com/rs?type=doc&id=2683832.1
  https://support.oracle.com/rs?type=doc&id=2682500.1
  https://support.oracle.com/rs?type=doc&id=2683241.1
  https://support.oracle.com/rs?type=doc&id=2682011.1
  https://support.oracle.com/rs?type=doc&id=2683840.1
  https://support.oracle.com/rs?type=doc&id=2682018.1
  https://support.oracle.com/rs?type=doc&id=2683841.1
  https://support.oracle.com/rs?type=doc&id=2683842.1
  https://support.oracle.com/rs?type=doc&id=2683843.1
  https://support.oracle.com/rs?type=doc&id=2683845.1

Oracle Solaris: CPU of April 2018.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2379155.1

Oracle Solaris: patch for third party software of January 2018 v3.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

Oracle Solaris: patch for third party software of July 2018 v3.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

Polycom: solution for Meltdown/Spectre.
The solution is indicated in information sources.

RHEL 5.9: new kernel packages.
New packages are available:
  RHEL 5: kernel 2.6.18-348.35.1.el5

RHEL 7.4: new kernel packages.
New packages are available:
  RHEL 7: kernel 3.10.0-693.55.1.el7

RHEL 7: new kernel-alt packages.
New packages are available:
  RHEL 7.0-7.7: kernel-alt 4.14.0-115.17.1.el7a

RHEL: new packages for Meltdown/Spectre.
New packages are available, as indicated in information sources.

Siemens SIMATIC: solution for Spectre.
The solution is indicated in information sources.

Siemens SIMATIC: solution for Spectre, Meltdown.
Some countermeasures are stated in information sources.

SIMATIC WinAC RTX F 2010: workaround for Processor.
A workaround is indicated in the information source.

Sonus Session Border Controller: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Spectracom SecureSync: solution for Spectre.
The solution is indicated in information sources.

Stormshield: solution for Meltdown/Spectre.
The solution is indicated in information sources.

SUSE LE 11 SP3: new kernel packages (09/01/2018).
New packages are available:
  SUSE LE 11 SP3: kernel 3.0.101-0.47.106.11.1

SUSE LE 11 SP3: new kernel packages (23/05/2018).
New packages are available:
  SUSE LE 11 SP3: kernel 3.0.101-0.47.106.29.1

SUSE LE 11 SP3: new xen packages (15/03/2018).
New packages are available:
  SUSE LE 11 SP3: xen 4.2.5_21-45.19.1

SUSE LE 11 SP3: new xen packages (27/08/2018).
New packages are available:
  SUSE LE 11 SP3: xen 4.2.5_21-45.25.1

SUSE LE 11 SP4: new kernel packages (04/01/2018).
New packages are available:
  SUSE LE 11 SP4: kernel 3.0.101-108.21.1

SUSE LE 11 SP4: new kernel packages (23/05/2018).
New packages are available:
  SUSE LE 11 SP4: kernel 3.0.101-108.48.1

SUSE LE 11 SP4: new xen packages (09/03/2018).
New packages are available:
  SUSE LE 11 SP4: xen 4.4.4_28-61.23.2

SUSE LE 11 SP4: new xen packages (11/06/2018).
New packages are available:
  SUSE LE 11 SP4: xen 4.4.4_32-61.29.2

SUSE LE 12 RTM: new kernel packages (17/01/2018).
New packages are available:
  SUSE LE 12 RTM: kernel 3.12.61-52.111.1

SUSE LE 12 RTM: new xen packages (06/03/2018).
New packages are available:
  SUSE LE 12 RTM: xen 4.4.4_28-22.62.1

SUSE LE 12 RTM: new xen packages (13/06/2018).
New packages are available:
  SUSE LE 12 RTM: xen 4.4.4_32-22.68.1

SUSE LE 12 SP1: new kernel packages (08/01/2018).
New packages are available:
  SUSE LE 12 SP1: kernel 3.12.74-60.64.69.1

SUSE LE 12 SP1: new xen packages (06/03/2018).
New packages are available:
  SUSE LE 12 SP1: xen 4.5.5_24-22.43.1

SUSE LE 12 SP1/SP3: new kernel packages.
New packages are available:
  SUSE LE 12 SP1: kernel 3.12.74-60.64.72.1
  SUSE LE 12 SP3: kernel 4.4.103-94.6.1

SUSE LE 12 SP2: new kernel packages.
New packages are available:
  SUSE LE 12 SP2: kernel 4.4.103-92.59.1

SUSE LE 12 SP2: new xen packages (11/04/2018).
New packages are available:
  SUSE LE 12 SP2: xen 4.7.5_02-43.27.1

SUSE LE 12 SP2: new xen packages (18/06/2018).
New packages are available:
  SUSE LE 12 SP2: xen 4.7.5_04-43.33.1

SUSE LE 12 SP2: new xen packages (19/02/2018).
New packages are available:
  SUSE LE 12 SP2: xen 4.7.4_06-43.24.1

SUSE LE 12 SP3: new kernel-rt packages.
New packages are available:
  SUSE LE 12 SP3: kernel-rt 4.4.139-3.17.1

SUSE LE 12 SP3: new webkit2gtk3 packages.
New packages are available, as indicated in information sources.

SUSE LE 12 SP3: new xen packages.
New packages are available:
  SUSE LE 12 SP3: xen 4.9.1_08-3.26.1

SUSE LE 12 SP4: new kernel packages (04/02/2019).
New packages are available:
  SUSE LE 12 SP4: kernel 4.12.14-6.6.2

SUSE LE 12 SP4: new kernel packages (27/03/2019).
New packages are available:
  SUSE LE 12 SP4: kernel 4.12.14-95.13.1

SUSE LE 15 SP1: new kernel packages.
New packages are available:
  SUSE LE 15 SP1: kernel 4.12.14-197.4.1

SUSE LE 15 SP1: new kernel-source-rt packages.
New packages are available:
  SUSE LE 15 SP1: kernel-source-rt 4.12.14-14.8.1

Symantec Content and Malware Analysis: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Synology: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Tableau Server: fixed versions.
The following versions are fixed:
  10.1.13, 10.2.8, 10.3.7, 10.4.3 et 10.5.1,
  9.1.22, 9.2.21, 9.3.19.

Ubuntu 12.04 ESM: new linux-image-3.2.0-133 packages.
New packages are available:
  Ubuntu 12.04 ESM: linux-image-3.2.0-133-generic-pae 3.2.0-133.179

Ubuntu: new firefox packages.
New packages are available:
  Ubuntu 17.10: firefox 57.0.4+build1-0ubuntu0.17.10.1
  Ubuntu 17.04: firefox 57.0.4+build1-0ubuntu0.17.04.1
  Ubuntu 16.04 LTS: firefox 57.0.4+build1-0ubuntu0.16.04.1
  Ubuntu 14.04 LTS: firefox 57.0.4+build1-0ubuntu0.14.04.1

Ubuntu: new libwebkit2gtk-4.0-37 packages.
New packages are available:
  Ubuntu 17.10: libjavascriptcoregtk-4.0-18 2.18.5-0ubuntu0.17.10.1, libwebkit2gtk-4.0-37 2.18.5-0ubuntu0.17.10.1
  Ubuntu 17.04: libjavascriptcoregtk-4.0-18 2.18.5-0ubuntu0.17.04.1, libwebkit2gtk-4.0-37 2.18.5-0ubuntu0.17.04.1
  Ubuntu 16.04 LTS: libjavascriptcoregtk-4.0-18 2.18.5-0ubuntu0.16.04.1, libwebkit2gtk-4.0-37 2.18.5-0ubuntu0.16.04.1

Ubuntu: new linux-image-3.13 packages.
New packages are available:
  Ubuntu 14.04 LTS: linux-image-3.13.0-141-generic 3.13.0-141.190
  Ubuntu 12.04 ESM: linux-image-3.13.0-140-generic 3.13.0-140.189~precise1, linux-image-generic-lts-trusty 3.13.0.140.131

Ubuntu: new linux-image-4.13.0 packages (23/01/2018).
New packages are available:
  Ubuntu 16.04 LTS: linux-image-4.13.0-31-generic 4.13.0-31.34~16.04.1
  Ubuntu 17.10: linux-image-4.13.0-31-generic 4.13.0-31.34

Ubuntu: new linux-image-4.4 packages (30/01/2018).
New packages are available:
  Ubuntu 16.04 LTS: linux-image-4.4.0-1017-kvm 4.4.0-1017.22

Ubuntu: new nvidia-384 packages.
New packages are available:
  Ubuntu 17.10: nvidia-384 384.111-0ubuntu0.17.10.1
  Ubuntu 17.04: nvidia-384 384.111-0ubuntu0.17.04.1
  Ubuntu 16.04 LTS: nvidia-384 384.111-0ubuntu0.16.04.1
  Ubuntu 14.04 LTS: nvidia-384 384.111-0ubuntu0.14.04.1

VMware ESXi/Workstation: patch for Meltdown/Spectre.
A patch is indicated in information sources.
The article 52345 indicates known problems.

VMware vCenter Server: fixed versions for Spectre/Meltdown.
The following versions are fixed:
  vCSA version 6.5 Update 1f

Wind River Linux: solution (21/05/2019).
The solution is indicated in information sources.

Wind River Linux: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Xen: solution for Meltdown/Spectre.
The solution is indicated in information sources.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides application vulnerability announces. The Vigil@nce vulnerability database contains several thousand vulnerabilities.