The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Vulnerability of Processors: memory reading via Spectre Branch Target

Synthesis of the vulnerability

A local attacker can monitor the performances of its process, in order to get information about the data used for computing by the processor.
Severity of this announce: 1/4.
Creation date: 05/01/2018.
Revision date: 07/02/2018.
Références of this computer vulnerability: 2016636, 519675, ADV180002, CERTFR-2018-AVI-004, CERTFR-2018-AVI-005, CERTFR-2018-AVI-006, CERTFR-2018-AVI-008, CERTFR-2018-AVI-009, CERTFR-2018-AVI-012, CERTFR-2018-AVI-013, CERTFR-2018-AVI-014, CERTFR-2018-AVI-016, CERTFR-2018-AVI-028, CERTFR-2018-AVI-029, CERTFR-2018-AVI-030, CERTFR-2018-AVI-032, CERTFR-2018-AVI-040, CERTFR-2018-AVI-048, CERTFR-2018-AVI-049, CERTFR-2018-AVI-075, CERTFR-2018-AVI-079, CERTFR-2018-AVI-080, CERTFR-2018-AVI-083, CERTFR-2018-AVI-094, CERTFR-2018-AVI-104, CERTFR-2018-AVI-118, CERTFR-2018-AVI-119, CERTFR-2018-AVI-124, CERTFR-2018-AVI-134, CERTFR-2018-AVI-161, CERTFR-2018-AVI-170, CERTFR-2018-AVI-196, CERTFR-2018-AVI-206, CERTFR-2018-AVI-208, CERTFR-2018-AVI-256, CERTFR-2019-AVI-242, CERTFR-2019-AVI-489, cisco-sa-20180104-cpusidechannel, cpujul2019, CTX231390, CTX231399, CVE-2017-5715, DLA-1349-1, DLA-1362-1, DLA-1369-1, DLA-1422-1, DLA-1422-2, DLA-1497-1, DLA-1506-1, DSA-2018-049, DSA-4120-1, DSA-4120-2, DSA-4179-1, DSA-4187-1, DSA-4188-1, DSA-4213-1, FEDORA-2018-21a7ad920c, FEDORA-2018-276558ff6f, FEDORA-2018-6b319763ab, FEDORA-2018-7e17849364, FEDORA-2018-e6fe35524d, FEDORA-2018-fb582aabcc, FG-IR-18-002, FreeBSD-SA-18:03.speculative_execution, FreeBSD-SA-19:26.mcu, HT208397, HT208401, JSA10842, JSA10873, K91229003, LSN-0035-1, MBGSA-1801, MFSA-2018-01, N1022433, nas8N1022433, openSUSE-SU-2018:0013-1, openSUSE-SU-2018:0022-1, openSUSE-SU-2018:0023-1, openSUSE-SU-2018:0026-1, openSUSE-SU-2018:0030-1, openSUSE-SU-2018:0059-1, openSUSE-SU-2018:0066-1, openSUSE-SU-2018:0187-1, openSUSE-SU-2018:0326-1, openSUSE-SU-2018:0408-1, openSUSE-SU-2018:0459-1, openSUSE-SU-2018:0710-1, openSUSE-SU-2018:0745-1, openSUSE-SU-2018:0780-1, openSUSE-SU-2018:0939-1, openSUSE-SU-2018:1502-1, openSUSE-SU-2018:1623-1, openSUSE-SU-2018:1631-1, openSUSE-SU-2018:2119-1, openSUSE-SU-2018:2237-1, openSUSE-SU-2018:2524-1, RHSA-2018:0007-01, RHSA-2018:0008-01, RHSA-2018:0009-01, RHSA-2018:0010-01, RHSA-2018:0011-01, RHSA-2018:0012-01, RHSA-2018:0013-01, RHSA-2018:0014-01, RHSA-2018:0015-01, RHSA-2018:0016-01, RHSA-2018:0017-01, RHSA-2018:0018-01, RHSA-2018:0020-01, RHSA-2018:0021-01, RHSA-2018:0022-01, RHSA-2018:0023-01, RHSA-2018:0024-01, RHSA-2018:0025-01, RHSA-2018:0026-01, RHSA-2018:0027-01, RHSA-2018:0028-01, RHSA-2018:0029-01, RHSA-2018:0030-01, RHSA-2018:0031-01, RHSA-2018:0032-01, RHSA-2018:0034-01, RHSA-2018:0035-01, RHSA-2018:0036-01, RHSA-2018:0037-01, RHSA-2018:0038-01, RHSA-2018:0039-01, RHSA-2018:0040-01, RHSA-2018:0053-01, RHSA-2018:0093-01, RHSA-2018:0094-01, RHSA-2018:0103-01, RHSA-2018:0104-01, RHSA-2018:0105-01, RHSA-2018:0106-01, RHSA-2018:0107-01, RHSA-2018:0108-01, RHSA-2018:0109-01, RHSA-2018:0110-01, RHSA-2018:0111-01, RHSA-2018:0112-01, RHSA-2018:0182-01, RHSA-2018:0292-01, RHSA-2018:0496-01, RHSA-2018:0512-01, RHSA-2018:1129-01, RHSA-2018:1196-01, SA161, SB10226, Spectre, spectre_meltdown_advisory, SSA-168644, SSA:2018-016-01, SSA:2018-037-01, SSA-608355, STORM-2018-001, SUSE-SU-2018:0006-1, SUSE-SU-2018:0007-1, SUSE-SU-2018:0008-1, SUSE-SU-2018:0009-1, SUSE-SU-2018:0011-1, SUSE-SU-2018:0012-1, SUSE-SU-2018:0019-1, SUSE-SU-2018:0020-1, SUSE-SU-2018:0031-1, SUSE-SU-2018:0036-1, SUSE-SU-2018:0039-1, SUSE-SU-2018:0040-1, SUSE-SU-2018:0041-1, SUSE-SU-2018:0051-1, SUSE-SU-2018:0056-1, SUSE-SU-2018:0067-1, SUSE-SU-2018:0068-1, SUSE-SU-2018:0069-1, SUSE-SU-2018:0113-1, SUSE-SU-2018:0114-1, SUSE-SU-2018:0115-1, SUSE-SU-2018:0131-1, SUSE-SU-2018:0171-1, SUSE-SU-2018:0219-1, SUSE-SU-2018:0383-1, SUSE-SU-2018:0416-1, SUSE-SU-2018:0437-1, SUSE-SU-2018:0438-1, SUSE-SU-2018:0472-1, SUSE-SU-2018:0525-1, SUSE-SU-2018:0555-1, SUSE-SU-2018:0601-1, SUSE-SU-2018:0609-1, SUSE-SU-2018:0638-1, SUSE-SU-2018:0660-1, SUSE-SU-2018:0678-1, SUSE-SU-2018:0705-1, SUSE-SU-2018:0708-1, SUSE-SU-2018:0762-1, SUSE-SU-2018:0831-1, SUSE-SU-2018:0838-1, SUSE-SU-2018:0841-1, SUSE-SU-2018:0861-1, SUSE-SU-2018:0909-1, SUSE-SU-2018:0920-1, SUSE-SU-2018:0986-1, SUSE-SU-2018:1077-1, SUSE-SU-2018:1080-1, SUSE-SU-2018:1308-1, SUSE-SU-2018:1363-1, SUSE-SU-2018:1368-1, SUSE-SU-2018:1376-1, SUSE-SU-2018:1386-1, SUSE-SU-2018:1498-1, SUSE-SU-2018:1503-1, SUSE-SU-2018:1567-1, SUSE-SU-2018:1570-1, SUSE-SU-2018:1571-1, SUSE-SU-2018:1603-1, SUSE-SU-2018:1658-1, SUSE-SU-2018:1661-1, SUSE-SU-2018:1699-1, SUSE-SU-2018:1759-1, SUSE-SU-2018:1784-1, SUSE-SU-2018:2082-1, SUSE-SU-2018:2141-1, SUSE-SU-2018:2189-1, SUSE-SU-2018:2528-1, SUSE-SU-2018:2631-1, SUSE-SU-2019:13999-1, Synology-SA-18:01, USN-3516-1, USN-3530-1, USN-3531-1, USN-3531-2, USN-3531-3, USN-3541-1, USN-3541-2, USN-3549-1, USN-3560-1, USN-3561-1, USN-3580-1, USN-3581-1, USN-3581-2, USN-3581-3, USN-3582-1, USN-3582-2, USN-3594-1, USN-3597-1, USN-3597-2, USN-3620-1, USN-3620-2, USN-3690-1, USN-3690-2, VIGILANCE-VUL-24949, VMSA-2018-0002, VMSA-2018-0004, VMSA-2018-0004.2, VMSA-2018-0004.3, VN-2018-001, VN-2018-002, VU#584653, XSA-254.

Description of the vulnerability

A local attacker can monitor the performances of its process, in order to get information about the data used for computing by the processor.
Full Vigil@nce bulletin... (Request your free trial)

This computer vulnerability bulletin impacts software or systems such as SNS, iOS by Apple, Mac OS X, Blue Coat CAS, Cisco ASR, Cisco Catalyst, Nexus by Cisco, NX-OS, Cisco Router, Cisco UCS, XenServer, Debian, ConnectPort TSx, Avamar, ExtremeXOS, Summit, BIG-IP Hardware, TMOS, Fedora, FortiAnalyzer, FortiGate, FortiManager, FortiOS, FreeBSD, Android OS, Chrome, AIX, IBM i, QRadar SIEM, Juniper J-Series, Junos OS, Junos Space, NSMXpress, Linux, McAfee Email Gateway, McAfee NSM, McAfee NTBA, McAfee Web Gateway, Meinberg NTP Server, Edge, IE, SQL Server, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows (platform) ~ not comprehensive, Windows RT, Firefox, openSUSE Leap, Opera, Oracle Communications, WebLogic, pfSense, RealPresence Collaboration Server, RealPresence Distributed Media Application, RealPresence Resource Manager, RHEL, SIMATIC, Slackware, Sonus SBC, SUSE Linux Enterprise Desktop, SLES, Symantec Content Analysis, Synology DSM, Synology DS***, Synology RS***, Ubuntu, Unix (platform) ~ not comprehensive, ESXi, VMware vSphere, VMware vSphere Hypervisor, VMware Workstation, Xen.

Our Vigil@nce team determined that the severity of this vulnerability bulletin is low.

The trust level is of type confirmed by the editor, with an origin of user shell.

An attacker with a expert ability can exploit this threat note.

Solutions for this threat

Processors: solution for Meltdown/Spectre.
Specific solution are attached to vulnerability bulletins.

AIX: solution for Spectre.
The solution is indicated in information sources.

Apple iOS: version 11.2.2.
The version 11.2.2 is fixed.

Apple macOS: version 10.13.2 Supplemental Update.
The version 10.13.2 Supplemental Update is fixed.

Cisco: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Citrix XenServer, NetScaler: patch for Meltdown/Spectre.
A patch is indicated in information sources.

Debian 7: new gcc-4.9-backport packages.
New packages are available:
  Debian 7: gcc-4.9-backport 4.9.2-10+deb7u1

Debian 7: new linux packages.
New packages are available:
  Debian 7: linux 3.2.101-1

Debian 8: new intel-microcode packages (17/09/2018).
New packages are available:
  Debian 8: intel-microcode 3.20180807a.1~deb8u1

Debian 8: new linux packages (02/05/2018).
New packages are available:
  Debian 8: linux 3.16.56-1

Debian 8: new linux packages (16/07/2018).
New packages are available:
  Debian 8: linux 3.16.57-2

Debian 8: new qemu packages.
New packages are available:
  Debian 8: qemu 1:2.1+dfsg-12+deb8u7

Debian 9: new linux packages.
New packages are available:
  Debian 9: linux 4.9.88-1

Debian 9: new qemu packages.
New packages are available:
  Debian 9: qemu 1:2.8+dfsg-6+deb9u4

Debian: new linux-image packages.
New packages are available:
  Debian 9: linux-image 4.9.82-1+deb9u3

DIGI ConnectPort TS: solution for Spectre.
The solution is indicated in information sources.

EMC Avamar: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Extreme Networks: solution for Meltdown/Spectre.
The solution is indicated in information sources.

F5 BIG-IP: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Fedora: new firefox packages.
New packages are available:
  Fedora 26: firefox 57.0.4-1.fc26
  Fedora 27: firefox 57.0.4-1.fc27

Fedora: new kernel packages.
New packages are available:
  Fedora 26: kernel 4.14.13-200.fc26
  Fedora 27: kernel 4.14.13-300.fc27

Fedora: new microcode_ctl packages.
New packages are available:
  Fedora 26: microcode_ctl 2.1-20.fc26
  Fedora 27: microcode_ctl 2.1-20.fc27

Firefox: version 57.0.4.
The version 57.0.4 is fixed:
  https://www.mozilla.org/

Fortinet: solution for Meltdown/Spectre.
Fixed versions are indicated in information sources.

FreeBSD: patch for Meltdown/Spectre.
A patch is available:
  https://security.FreeBSD.org/patches/SA-18:03/speculative_execution-amd64-11.patch

FreeBSD: solution for Intel CPU Microcode.
The solution is indicated in information sources.

FreeBSD: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Google Android OS: patch 2019-09-05.
A 2019-09-05 patch is indicated in information sources.

Google Android/Pixel: patch for January 2018.
A patch is indicated in information sources.

Google Android/Pixel: patch for May 2018.
A patch is indicated in information sources.

Google Chrome: workaround for Meltdown/Spectre.
A workaround is indicated in the information source.

IBM AIX: patch for Spectre/Meltdown.
A patch is available:
  http://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar

IBM i: solution for Spectre/Meltdown.
The solution is indicated in information sources.

IBM QRadar SIEM: patch for Spectre/Meltdown.
A patch is indicated in information sources.

Juniper: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Junos Space: solution.
The solution is indicated in information sources.

Linux kernel: patch for Meltdown/Spectre.
A patch is indicated in information sources.

Linux kernel: version 3.16.56.
The version 3.16.56 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v3.x/

Linux kernel: version 3.2.101.
The version 3.2.101 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v3.x/

Linux kernel: version 4.14.11.
The version 4.14.11 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/

Linux kernel: version 4.14.151.
The version 4.14.151 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/

Linux kernel: version 4.14.16.
The version 4.14.16 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/linux-4.14.16.tar.xz

Linux kernel: version 4.14.20.
The version 4.14.20 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/linux-4.14.20.tar.xz

Linux kernel: version 4.15.4.
The version 4.15.4 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/linux-4.15.4.tar.xz

Linux kernel: version 4.4.112.
The version 4.4.112 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/

Linux kernel: version 4.4.115.
The version 4.4.115 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/linux-4.4.115.tar.xz

Linux kernel: version 4.9.77.
The version 4.9.77 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/

Linux kernel: version 4.9.79.
The version 4.9.79 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/linux-4.9.79.tar.xz

McAfee: patch for Spectre/Meltdown.
A patch is available:
  https://kc.mcafee.com/corporate/index?page=content&id=KB56057

Meinberg: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Microsoft: solution for Meltdown/Spectre.
The solution is indicated in information sources.

openSUSE Leap 15.0: new kernel-firmware packages.
New packages are available:
  openSUSE Leap 15.0: kernel-firmware 20180525-lp150.2.3.1, ucode-amd 20180525-lp150.2.3.1

openSUSE Leap 15.0: new kernel packages.
New packages are available:
  openSUSE Leap 15.0: kernel 4.12.14-lp150.12.7.1

openSUSE Leap 15.0: new xen packages.
New packages are available:
  openSUSE Leap 15.0: xen 4.10.1_04-lp150.2.3.1

openSUSE Leap 42.3: new kernel-firmware packages.
New packages are available:
  openSUSE Leap 42.3: kernel-firmware 20170530-20.1

openSUSE Leap 42.3: new kernel-modules packages.
New packages are available, as indicated in information sources.

openSUSE Leap 42.3: new kernel packages.
New packages are available:
  openSUSE Leap 42.3: kernel 4.4.114-42.1

openSUSE Leap 42.3: new kmp packages.
New packages are available, as indicated in information sources.

openSUSE Leap 42.3: new libvirt packages.
New packages are available:
  openSUSE Leap 42.3: libvirt 3.3.0-15.1

openSUSE Leap 42.3: new qemu packages.
New packages are available:
  openSUSE Leap 42.3: qemu 2.9.1-41.1

openSUSE Leap 42.3: new xen packages (16/02/2018).
New packages are available:
  openSUSE Leap 42.3: xen 4.9.1_08-16.1

openSUSE Leap: new kernel-firmware packages.
New packages are available:
  openSUSE Leap 42.2: kernel-firmware 20170530-7.12.1
  openSUSE Leap 42.3: kernel-firmware 20170530-14.1

openSUSE Leap: new kernel packages.
New packages are available:
  openSUSE Leap 42.2: kernel 4.4.104-18.44.1
  openSUSE Leap 42.3: kernel 4.4.104-39.1

openSUSE Leap: new qemu packages.
New packages are available:
  openSUSE Leap 42.2: qemu 2.6.2-31.18.1
  openSUSE Leap 42.3: qemu 2.9.1-38.1

openSUSE Leap: new ucode-intel packages.
New packages are available:
  openSUSE Leap 42.2: ucode-intel 20180108-7.12.1
  openSUSE Leap 42.3: ucode-intel 20180312-22.1

openSUSE Leap: new virtualbox packages (24/01/2018).
New packages are available:
  openSUSE Leap 42.3: virtualbox 5.1.32-42.1
  openSUSE Leap 42.2: virtualbox 5.1.32-19.49.1

openSUSE Leap: new virtualbox packages (27/08/2018).
New packages are available:
  openSUSE Leap 42.3: virtualbox 5.2.18-56.1

openSUSE Leap: new webkit2gtk3 packages (01/02/2018).
New packages are available, as indicated in information sources.

Oracle Communications: CPU of July 2019.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2559239.1
  https://support.oracle.com/rs?type=doc&id=2563691.1
  https://support.oracle.com/rs?type=doc&id=2559240.1
  https://support.oracle.com/rs?type=doc&id=2559722.1
  https://support.oracle.com/rs?type=doc&id=2559225.1
  https://support.oracle.com/rs?type=doc&id=2559721.1
  https://support.oracle.com/rs?type=doc&id=2559256.1
  https://support.oracle.com/rs?type=doc&id=2559242.1
  https://support.oracle.com/rs?type=doc&id=2559243.1
  https://support.oracle.com/rs?type=doc&id=2559648.1

pfSense: version 2.4.3.
The version 2.4.3 is fixed:
  https://www.netgate.com/

Polycom: solution for Meltdown/Spectre.
The solution is indicated in information sources.

RHEL: new packages for Meltdown/Spectre.
New packages are available, as indicated in information sources.

Siemens SIMATIC: solution for Spectre, Meltdown.
Some countermeasures are stated in information sources.

SIMATIC WinAC RTX F 2010: workaround for Processor.
A workaround is indicated in the information source.

Slackware: new kernel packages.
New packages are available:
  Slackware 14.0: kernel 3.2.98-i586-1, kernel-firmware 20180104_65b1c68-1
  Slackware 14.2: kernel-generic 4.4.115-1, kernel-firmware 20180201_2aa2ac2-1

Sonus Session Border Controller: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Spectracom SecureSync: solution for Spectre.
The solution is indicated in information sources.

Stormshield: solution for Meltdown/Spectre.
The solution is indicated in information sources.

SUSE LE 11: new microcode_ctl packages.
New packages are available:
  SUSE LE 11 SP3: microcode_ctl 1.17-102.83.15.1
  SUSE LE 11 SP4: microcode_ctl 1.17-102.83.15.1

SUSE LE 11 SP3/4: new gcc43 packages.
New packages are available:
  SUSE LE 11 SP3: gcc43 4.3.4_20091019-37.9.1
  SUSE LE 11 SP4: gcc43 4.3.4_20091019-37.9.1

SUSE LE 11 SP3: new kernel packages (09/01/2018).
New packages are available:
  SUSE LE 11 SP3: kernel 3.0.101-0.47.106.11.1

SUSE LE 11 SP3: new kernel packages (12/03/2018).
New packages are available:
  SUSE LE 11 SP3: kernel 3.0.101-0.47.106.19.1

SUSE LE 11 SP3: new kernel packages (23/05/2018).
New packages are available:
  SUSE LE 11 SP3: kernel 3.0.101-0.47.106.29.1

SUSE LE 11 SP3: new kvm packages (09/01/2018).
New packages are available:
  SUSE LE 11 SP3: kvm 1.4.2-53.14.1

SUSE LE 11 SP3: new kvm packages (17/05/2018).
New packages are available:
  SUSE LE 11 SP3: kvm 1.4.2-53.17.1

SUSE LE 11 SP3: new libvirt packages.
New packages are available:
  SUSE LE 11 SP3: libvirt 1.0.5.9-21.5.1

SUSE LE 11 SP3: new xen packages (15/03/2018).
New packages are available:
  SUSE LE 11 SP3: xen 4.2.5_21-45.19.1

SUSE LE 11 SP3: new xen packages (27/08/2018).
New packages are available:
  SUSE LE 11 SP3: xen 4.2.5_21-45.25.1

SUSE LE 11 SP4: new iscsitarget/ofed packages.
New packages are available:
  SUSE LE 11 SP4: iscsitarget 1.4.20_3.0.101_108.52-0.43.2.1, ofed 1.5.4.1_3.0.101_108.52-22.3.1

SUSE LE 11 SP4: new kernel packages (04/01/2018).
New packages are available:
  SUSE LE 11 SP4: kernel 3.0.101-108.21.1

SUSE LE 11 SP4: new kernel packages (23/05/2018).
New packages are available:
  SUSE LE 11 SP4: kernel 3.0.101-108.48.1

SUSE LE 11 SP4: new kernel packages (26/04/2018).
New packages are available:
  SUSE LE 11 SP4: kernel 3.0.101-108.38.1

SUSE LE 11 SP4: new kernel packages (28/02/2018).
New packages are available:
  SUSE LE 11 SP4: kernel 3.0.101-108.35.1

SUSE LE 11 SP4: new kernel-rt packages.
New packages are available:
  SUSE LE 11 SP4: kernel-rt 3.0.101.rt130-69.21.1

SUSE LE 11 SP4: new KMP packages.
New packages are available, as indicated in information sources.

SUSE LE 11 SP4: new kvm packages (05/01/2018).
New packages are available:
  SUSE LE 11 SP4: kvm 1.4.2-60.6.1

SUSE LE 11 SP4: new kvm packages (26/04/2018).
New packages are available:
  SUSE LE 11 SP4: kvm 1.4.2-60.9.1

SUSE LE 11 SP4: new libvirt packages.
New packages are available:
  SUSE LE 11 SP4: libvirt 1.2.5-23.6.1

SUSE LE 11 SP4: new microcode_ctl packages.
New packages are available:
  SUSE LE 11 SP4: microcode_ctl 1.17-102.83.21.1

SUSE LE 11 SP4: new xen packages (09/03/2018).
New packages are available:
  SUSE LE 11 SP4: xen 4.4.4_28-61.23.2

SUSE LE 11 SP4: new xen packages (11/06/2018).
New packages are available:
  SUSE LE 11 SP4: xen 4.4.4_32-61.29.2

SUSE LE 12: new kernel-firmware packages (04/01/2018).
New packages are available:
  SUSE LE 12 RTM: kernel-firmware 20140807git-5.3.1
  SUSE LE 12 SP1: kernel-firmware 20160516git-10.8.1
  SUSE LE 12 SP2: kernel-firmware 20170530-21.16.1
  SUSE LE 12 SP3: kernel-firmware 20170530-21.16.1

SUSE LE 12: new kernel-firmware packages (08/06/2018).
New packages are available:
  SUSE LE 12 RTM: kernel-firmware 20140807git-5.8.1
  SUSE LE 12 SP1: kernel-firmware 20160516git-10.13.1
  SUSE LE 12 SP2: kernel-firmware 20170530-21.22.1
  SUSE LE 12 SP3: kernel-firmware 20170530-21.22.1

SUSE LE 12: new kernel packages (08/02/2018).
New packages are available:
  SUSE LE 12 SP3: kernel 4.4.114-94.11.3
  SUSE LE 12 SP2: kernel 4.4.114-92.64.1

SUSE LE 12: new kernel packages (14/02/2018).
New packages are available:
  SUSE LE 12 RTM: kernel 3.12.61-52.119.1
  SUSE LE 12 SP1: kernel 3.12.74-60.64.82.1

SUSE LE 12: new ucode-intel packages.
New packages are available:
  SUSE LE 12 RTM: ucode-intel 20180425-13.20.1
  SUSE LE 12 SP1: ucode-intel 20180425-13.20.1
  SUSE LE 12 SP2: ucode-intel 20180425-13.20.1
  SUSE LE 12 SP3: ucode-intel 20180425-13.20.1

SUSE LE 12 RTM: new kernel packages (17/01/2018).
New packages are available:
  SUSE LE 12 RTM: kernel 3.12.61-52.111.1

SUSE LE 12 RTM: new libvirt packages.
New packages are available:
  SUSE LE 12 RTM: libvirt 1.2.5-27.13.1

SUSE LE 12 RTM: new qemu packages (05/01/2018).
New packages are available:
  SUSE LE 12 RTM: qemu 1.0.0-48.37.1

SUSE LE 12 RTM: new qemu packages (24/05/2018).
New packages are available:
  SUSE LE 12 RTM: qemu 2.0.2-48.40.2

SUSE LE 12 RTM: new xen packages (06/03/2018).
New packages are available:
  SUSE LE 12 RTM: xen 4.4.4_28-22.62.1

SUSE LE 12 RTM: new xen packages (13/06/2018).
New packages are available:
  SUSE LE 12 RTM: xen 4.4.4_32-22.68.1

SUSE LE 12 SP1: new kernel packages (08/01/2018).
New packages are available:
  SUSE LE 12 SP1: kernel 3.12.74-60.64.69.1

SUSE LE 12 SP1: new libvirt packages.
New packages are available:
  SUSE LE 12 SP1: libvirt 1.2.18.4-22.3.1

SUSE LE 12 SP1: new qemu packages (10/01/2018).
New packages are available:
  SUSE LE 12 SP1: qemu 2.3.1-33.6.1

SUSE LE 12 SP1: new qemu packages (22/05/2018).
New packages are available:
  SUSE LE 12 SP1: qemu 2.3.1-33.9.4

SUSE LE 12 SP1: new xen packages (06/03/2018).
New packages are available:
  SUSE LE 12 SP1: xen 4.5.5_24-22.43.1

SUSE LE 12 SP1/SP3: new kernel packages.
New packages are available:
  SUSE LE 12 SP1: kernel 3.12.74-60.64.72.1
  SUSE LE 12 SP3: kernel 4.4.103-94.6.1

SUSE LE 12 SP2: new kernel packages.
New packages are available:
  SUSE LE 12 SP2: kernel 4.4.103-92.59.1

SUSE LE 12 SP2: new libvirt packages (04/04/2018).
New packages are available:
  SUSE LE 12 SP2: libvirt 2.0.0-27.34.1

SUSE LE 12 SP2: new libvirt packages (06/09/2018).
New packages are available:
  SUSE LE 12 SP2: libvirt 2.0.0-27.45.1

SUSE LE 12 SP2: new qemu packages (08/01/2018).
New packages are available:
  SUSE LE 12 SP2: qemu 2.6.2-41.31.1

SUSE LE 12 SP2: new qemu packages (28/03/2018).
New packages are available:
  SUSE LE 12 SP2: qemu 2.6.2-41.37.1

SUSE LE 12 SP2: new xen packages (11/04/2018).
New packages are available:
  SUSE LE 12 SP2: xen 4.7.5_02-43.27.1

SUSE LE 12 SP2: new xen packages (18/06/2018).
New packages are available:
  SUSE LE 12 SP2: xen 4.7.5_04-43.33.1

SUSE LE 12 SP2: new xen packages (19/02/2018).
New packages are available:
  SUSE LE 12 SP2: xen 4.7.4_06-43.24.1

SUSE LE 12 SP3: new kernel-modules packages.
New packages are available, as indicated in information sources.

SUSE LE 12 SP3: new kernel-rt packages.
New packages are available:
  SUSE LE 12 SP3: kernel-rt 4.4.120-3.8.1

SUSE LE 12 SP3: new libvirt packages.
New packages are available:
  SUSE LE 12 SP3: libvirt 3.3.0-5.19.2

SUSE LE 12 SP3: new qemu packages (04/01/2018).
New packages are available:
  SUSE LE 12 SP3: qemu 2.9.1-6.9.2

SUSE LE 12 SP3: new qemu packages (22/03/2018).
New packages are available:
  SUSE LE 12 SP3: qemu 2.9.1-6.12.1

SUSE LE 12 SP3: new webkit2gtk3 packages.
New packages are available, as indicated in information sources.

SUSE LE 12 SP3: new xen packages.
New packages are available:
  SUSE LE 12 SP3: xen 4.9.1_08-3.26.1

SUSE LE 15: new kernel-firmware packages.
New packages are available:
  SUSE LE 15 RTM: kernel-firmware 20180525-3.3.1

Symantec Content and Malware Analysis: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Synology: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Tableau Server: fixed versions.
The following versions are fixed:
  10.1.13, 10.2.8, 10.3.7, 10.4.3 et 10.5.1,
  9.1.22, 9.2.21, 9.3.19.

Ubuntu 12.04 ESM: new linux-image-3.2.0-133 packages.
New packages are available:
  Ubuntu 12.04 ESM: linux-image-3.2.0-133-generic-pae 3.2.0-133.179

Ubuntu 14.04: new linux-image-generic packages.
New packages are available:
  Ubuntu 14.04 LTS: linux-image-generic 3.13.0.143.153

Ubuntu: new amd64-microcode packages.
New packages are available:
  Ubuntu 18.04 LTS: amd64-microcode 3.20180524.1~ubuntu0.18.04.1
  Ubuntu 17.10: amd64-microcode 3.20180524.1~ubuntu0.17.10.1
  Ubuntu 16.04 LTS: amd64-microcode 3.20180524.1~ubuntu0.16.04.1
  Ubuntu 14.04 LTS: install nothing or revert with amd64-microcode 3.20180524.1~ubuntu0.14.04.2+really20130710.1

Ubuntu: new firefox packages.
New packages are available:
  Ubuntu 17.10: firefox 57.0.4+build1-0ubuntu0.17.10.1
  Ubuntu 17.04: firefox 57.0.4+build1-0ubuntu0.17.04.1
  Ubuntu 16.04 LTS: firefox 57.0.4+build1-0ubuntu0.16.04.1
  Ubuntu 14.04 LTS: firefox 57.0.4+build1-0ubuntu0.14.04.1

Ubuntu: new intel-microcode packages.
New packages are available:
  Ubuntu 17.10: intel-microcode 3.20180312.0~ubuntu17.10.1
  Ubuntu 16.04 LTS: intel-microcode 3.20180312.0~ubuntu16.04.1
  Ubuntu 14.04 LTS: intel-microcode 3.20180312.0~ubuntu14.04.1

Ubuntu: new libvirt packages.
New packages are available:
  Ubuntu 17.10: libvirt-bin 3.6.0-1ubuntu6.2, libvirt0 3.6.0-1ubuntu6.2
  Ubuntu 16.04 LTS: libvirt-bin 1.3.1-1ubuntu10.17, libvirt0 1.3.1-1ubuntu10.17
  Ubuntu 14.04 LTS: libvirt-bin 1.2.2-0ubuntu13.1.25, libvirt0 1.2.2-0ubuntu13.1.25

Ubuntu: new libwebkit2gtk-4.0-37 packages.
New packages are available:
  Ubuntu 17.10: libjavascriptcoregtk-4.0-18 2.18.5-0ubuntu0.17.10.1, libwebkit2gtk-4.0-37 2.18.5-0ubuntu0.17.10.1
  Ubuntu 17.04: libjavascriptcoregtk-4.0-18 2.18.5-0ubuntu0.17.04.1, libwebkit2gtk-4.0-37 2.18.5-0ubuntu0.17.04.1
  Ubuntu 16.04 LTS: libjavascriptcoregtk-4.0-18 2.18.5-0ubuntu0.16.04.1, libwebkit2gtk-4.0-37 2.18.5-0ubuntu0.16.04.1

Ubuntu: new linux-image-3.13.0 packages.
New packages are available:
  Ubuntu 12.04 ESM: linux-image-generic-lts-trusty 3.13.0.144.135
  Ubuntu 14.04 LTS: linux-image-generic 3.13.0.144.154

Ubuntu: new linux-image-4.13.0 packages (23/01/2018).
New packages are available:
  Ubuntu 16.04 LTS: linux-image-4.13.0-31-generic 4.13.0-31.34~16.04.1
  Ubuntu 17.10: linux-image-4.13.0-31-generic 4.13.0-31.34

Ubuntu: new linux-image-4.13 packages.
New packages are available:
  Ubuntu 17.10: linux-image-4.13.0-36-generic-lpae 4.13.0-36.40
  Ubuntu 16.04 LTS: linux-image-4.13.0-36-generic-lpae 4.13.0-36.40~16.04.1

Ubuntu: new linux-image-4.4 packages (22/02/2018).
New packages are available:
  Ubuntu 16.04 LTS: linux-image-4.4.0-116-generic-lpae 4.4.0-116.140
  Ubuntu 14.04 LTS: linux-image-4.4.0-116-generic-lpae 4.4.0-116.140~14.04.1

Ubuntu: new linux-image-4.4 packages (30/01/2018).
New packages are available:
  Ubuntu 16.04 LTS: linux-image-4.4.0-1017-kvm 4.4.0-1017.22

Ubuntu: new qemu-system packages.
New packages are available:
  Ubuntu 17.10: qemu-system 1:2.10+dfsg-0ubuntu3.4
  Ubuntu 16.04 LTS: qemu-system 1:2.5+dfsg-5ubuntu10.20
  Ubuntu 14.04 LTS: qemu-system 2.0.0+dfsg-2ubuntu1.38

VMware ESXi/Workstation: patch for Meltdown/Spectre.
A patch is indicated in information sources.
The article 52345 indicates known problems.

Wind River Linux: solution for Meltdown/Spectre.
The solution is indicated in information sources.

Xen: solution for Meltdown/Spectre.
The solution is indicated in information sources.
Full Vigil@nce bulletin... (Request your free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a computers vulnerabilities patch. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.