Warning: file_put_contents(/srv/users/serverpilot/apps/bitupdateus/public/wp-content/plugins/bulk-post-0.4-1/cache/sessions//6ftV8g81DgQK0BMDR8NJU01wwVv6Gm9bEhLBNs9B): failed to open stream: No space left on device in /srv/users/serverpilot/apps/bitupdateus/public/wp-content/plugins/stupidpie-1.8.3-1/vendor/illuminate/filesystem/Filesystem.php on line 122
  Meltdown and Specter: The Safety Notices and Updates of Hardware and Software Manufacturers | Bit Updates
Home » bitcoin updates » Meltdown and Specter: The Safety Notices and Updates of Hardware and Software Manufacturers

Meltdown and Specter: The Safety Notices and Updates of Hardware and Software Manufacturers

Tuesday, January 9th, 2018 | bitcoin updates

             Manufacturers of hardware and software are equally affected by the vulnerabilities Meltdown and Specter. A link overview to statements, further information and update notices.


        Many modern and older processors are vulnerable to the Meltdown and Specter attack scenarios due to their hardware architecture (Analysis: How Meltdown and Specter Work). For now, the gaps can only be closed by changes to the software, ie the program codes of operating systems such as Windows, macOS, Linux, Android and iOS as well as patches for individual applications such as Firefox. Therefore, it is essential for users to always get their operating systems up-to-date with the latest updates and also to update applications as quickly as possible.



        CPU vulnerabilities Meltdown and Specter

The discovered in processors vulnerabilities Meltdown and Specter hit the processor manufacturers into the market – especially Intel. From the gaps arise more than a dozen attack possibilities – a security supergau.

Below are links to up-to-date information and safety notices from Meltdown and Specter hardware and software vendors. The overview is constantly updated, we are grateful to our readers for the latest information on new statements in the forum.

Information pages and updates
Processor Speculative Execution Research Disclosure

AMDAn Update on AMD Processor Security

AndroidAndroid Security Bulletin-January 2018

AVMMeltdown and Specter – no attack on AVM products

AppleAbout speculative execution vulnerabilities in ARM-based and Intel CPUs

ARMVulnerability of Speculative Processors to Cache Timing Side-Channel Mechanism

AsusASUS Motherboards Microcode Update for Speculative Execution

Chromium Project Actions Required to Mitigate Speculative Side-Channel Attack Techniques
CentOSCentOS Information for VU # 584653

CERT Software Engineering Institute Carnegie Mellon University Vulnerability Note VU # 584653: CPU hardware vulnerable to side-channel attacks

Check PointCheck Point Response to Meltdown and Specter (CVE-2017-5753, CVE-2017-5715, CVE-2017-5754)

CiscoCPU Side Channel Information Disclosure Vulnerabilities

CitrixCitrix Security Updates for CVE-2017-5715, CVE-2017-5753, CVE-2017-5754

DebianDebian Security Advisory: DSA-4078-1 linux – security update

DellMeltdown and Specter Vulnerabilities
FedoraProtect your Fedora system against Meltdown
CPU hardware vulnerable to Meltdown and Specter attacks

FreeBSD4. January: Due to the fundamental nature of the attacks, no estimate is yet available for publication date of patches.

GoogleGoogle's Mitigations Against CPU Speculative Execution Attack Methods

HuaweiCPU Vulnerabilities 'Meltdown' and 'Specter'

HPEHPESBHF03805 rev.2 – Certain HPE products using Microprocessors from Intel, AMD, and ARM, with Speculative Execution, Elevation of Privilege and Information Disclosure

IBMPotential CPU Security Issue (possibly also IBM Z)
Potential Impact on Processors in the POWER family

IntelIntel Responds to Security Research Findings
Intel Issues Updates to Protect Systems from Security Exploits
INTEL-SA-00088: Speculative Execution and Indirect Branch Prediction Side Channel Analysis Method

LancomSpectre and Meltdown: LANCOM devices are not affected
LenovoLenovo Security Advisory: LEN-18282: Reading Privileged Memory with a Side Channel

Linux Foundationx86 / kpti: Kernel Page Table Isolation (what KAISER
McAfeeMeltdown and Specter – McAfee Product Compatibility Update

MicrosoftJanuary 3, 2018-KB4056892 (OS Build 16299.192)
Windows Server guidance to protect against speculative execution side-channel vulnerabilities
Windows Client Guidance for IT Pros to protect against speculative execution side-channel vulnerabilities

Microsoft Edge and Internet Explorer speculative execution side-channel attacks

Microsoft Azure customers from CPU vulnerability

MozillaMitigations landing for new class of timing attack

NetgearSecurity Advisory for Speculative Code Execution (Specter and Meltdown) on Some ReadyNAS and ReadyDATA Storage Systems, PSV-2018-0005

NvidiaNvidia's response to speculative side channels CVE-2017-5753, CVE-2017-5715, and CVE-2017-5754

OracleCVE-2017-5715 (Oracle Linux version 6, 7, Oracle VM version 3.4, qemu-kvm)

ProxmoxMeltdown and Specter Linux kernel fixes

RedhatKernel Side Channel Attacks – CVE-2017-5754 CVE-2017-5753 CVE-2017-5715

SupermicroSecurity Vulnerabilities Regarding Side Channel Speculative Execution and Indirect Branch Prediction Information Disclosure

SUSESUSE Addresses Meltdown and Specter Vulnerabilities

SynologySynology-SA-18: 01 Meltdown and Specter Attacks
Thomas-Krenn safety instructions for Meltdown and Specter

Ubuntu Ubuntu Updates for the Meltdown / Specter Vulnerabilities

VMwareMeltdown and Specter: VMware products



    If you have problems playing the video, please enable JavaScript






Behind the Scenes: As a l

Fur coats, woolly pajamas, sequined dresses lined up on clothes rails behind each

DGAP-Adhoc: HolidayCheck

HolidayCheck Group AG raises earnings forecast for 2017 due to positive business development

Internet pioneers plead f

                                       On December 14, net neutrality is set to be

Theater Controversy in Be

The situation in the Volksbühne at Rosa-Luxemburg-Platz, which has been occupied since last