Useful links about Meltdown and Spectre

Everyone is  working on to fix the Meltdown and Spectre so just thought of sharing few links which will help to handle the issue efficiently .

HP

Today HP has released update for System ROM and we can find below link to download and information.

http://h22208.www2.hpe.com/eginfolib/securityalerts/SCAM/Side_Channel_Analysis_Method.html

https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00039267en_us

VMware

On addition to the NOV Patch , VMware has released today the below link which have to be updated.

https://kb.vmware.com/s/article/52085

https://kb.vmware.com/s/article/52245

https://kb.vmware.com/s/article/52264

 

Redhat

https://access.redhat.com/security/vulnerabilities/speculativeexecution

AWS Linux

https://alas.aws.amazon.com/ALAS-2018-939.html,

https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/

Ubuntu

https://usn.ubuntu.com/usn/

https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown)

Trend

Trend has released the useful link for the Deep Security Protection and also office scan.

https://success.trendmicro.com/solution/1119183

Debian

https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown

SUSE

https://www.suse.com/support/kb/doc/?id=7022512

Windows

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002

https://support.microsoft.com/en-us/help/4073119/windows-client-guidance-for-it-pros-to-protect-against-speculative-exe

https://support.microsoft.com/en-us/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution

Apple

https://support.apple.com/en-us/HT208394

https://support.apple.com/en-us/HT208397

Google

https://support.google.com/faqs/answer/7622138

Mozilla

https://www.mozilla.org/en-US/security/advisories/mfsa2018-01/

Citrix XenServer

https://support.citrix.com/article/CTX231390?_ga=2.162681087.2115616259.1515182465-735926685.1515182464

NVIDIA

http://nvidia.custhelp.com/app/answers/detail/a_id/4611

Other Links

Below Links will help to verify and more info on the issue.

Spectre and Meltdown

Use PowerShell to verifying protections again speculative execution side-channel vulnerabilities CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre)

PowerCLI script : How to confirm a ESXi VMware hypervisor & microcode patches are applied?: Spectre vulnerability

https://virtualcornerstone.com/2018/01/08/validating-compliance-of-vmsa-2018-0002-and-bios-update/

 

This entry was posted in Dell, ESXi issue, ESXi Patches, ESXi Tools, Firmware upgrade, HP, Trend Micro Deep Security, VCSA6.5, VMware, Windows and tagged , , . Bookmark the permalink.

Leave a comment