Summary of the patch status for Meltdown / Spectre
Meltdown and Spectre are hardware design vulnerabilities in all modern CPUs based on speculative execution. Background infos:
- https://spectreattack.com/ or https://meltdownattack.com/ (both pages serve identical content)
- https://googleprojectzero.blogspot.dk/2018/01/reading-privileged-memory-with-side.html
The bug is in the hardware, but mitigations in operating systems are possible and are getting shipped now. I'm collecting notes on the patch status in various software products. This will change rapidly and may contain errors. If you have better info please send pull requests.
(Use at your own risk)
- Linux: Stéphane Lesimple put together a simple shell script to tell if your Linux installation is vulnerable against the 3 "speculative execution" CVEs.
- Microsoft Windows: See the Windows section in this document containing the link to the official Powershell script.
- In a recent tweet, Moritz Lipp (Graz University of Technology) has announced the release of their PoC implementations for Meltdown.
- In a recent tweet, Jann Horn (Google's Project Zero) has announced that the PoC code referenced in their recent blogpost about CPUs is now public.
- The LSDS group at Imperial College London has published sample code demonstrating a Spectre-like attack against an Intel SGX enclave.
Kernel Page Table Isolation is a mitigation in the Linux Kernel, originally named KAISER.
- Version 4.14.11 contains KPTI.
- Version 4.15-rc6 contains KPTI.
- Longterm support kernels Version 4.9.75 and 4.4.110 contain KPTI backports.
Noteworthy:
- Comment by kernel developer Andrew Lutomirski that pre-4.14 kernels got an earlier version of KPTI and may contain bugs.
- Explanation of PCID, which will reduce performance impact of KPTI on newer kernels.
minipli is an unofficial fork of the former grsecurity patches (original grsecurity is no longer publicly available). minipli is based on the longterm kernel 4.9, which supports KPTI since 4.9.75, yet the patchset isn't ported yet.
- Fixed with Android Security Bulletin—January 2018.
- Microsoft Advisory
- Windows Server Guidance and Windows Client Guidance. Note: both links include a Powershell tool to query the status of Windows mitigations for CVE-2017-5715 (branch target injection) and CVE-2017-5754 (rogue data cache load).
- Protecting guest virtual machines from CVE-2017-5715 (branch target injection)
- Understanding the performance impact of Spectre and Meltdown mitigations on Windows Systems
Update - Tue 9 Jan 09:00 UTC
Microsoft has reports of some customers with AMD devices getting into an unbootable state after installing this KB. To prevent this issue, Microsoft will temporarily pause Windows OS updates to devices with impacted AMD processors (older CPUs, eg. Athlon and Sempron) at this time. Microsoft is working with AMD to resolve this issue and resume Windows OS security updates to the affected AMD devices via Windows Update and WSUS as soon as possible. If you have experienced an unbootable state or for more information see KB4073707. For AMD specific information please contact AMD.
Apple has already released mitigations in iOS 11.2, macOS 10.13.2, and tvOS 11.2 to help defend against Meltdown.
Update Mon 8 Jan 18:00 UTC
Apple has released security improvements to Safari and WebKit to mitigate the effects of Spectre (CVE-2017-5753 and CVE-2017-5715):
- macOS High Sierra 10.13.2 Supplemental Update
- Safari 11.0.2 for Mac OS X El Capitan 10.11.6 and macOS Sierra 10.12.6
- iOS 11.2.2 update for iPhone and iPad
Update - Sun 7 Jan 2018, 9:00 UTC
Based on the Apple's response posted here, Meltdown (CVE-2017-5754) is currently only addressed in iOS 11.2, macOS 10.13.2, and tvOS 11.2. Apple cannot say at this time if there will be updates to OS versions prior to the ones listed in their article at this time. The same can be said for Spectre (CVE-2017-5753 and CVE-2017-5715) and any updates for Safari. This means that at this given time there are NO patches for 10.11.x (El Capitan) or 10.12.x (Sierra).
- Red Hat Advisory
- CentOS:
- 7 - CESA-2018:0007 (kernel), CESA-2018:0012 (microcode_ctl), CESA-2018:0014 (linux-firmware), CESA-2018:0023 (qemu-kvm), CESA-2018:0029 (libvirt)
- 6 - CESA-2018:0008 (kernel), CESA-2018:0013 (microcode_ctl), CESA-2018:0024 (qemu-kvm), CESA-2018:0030 (libvirt)
- Fedora - Fixed in FEDORA-2018-8ed5eff2c0 (Fedora 26) and FEDORA-2018-22d5fa8a90 (Fedora 27).
Update - Wed 10 Jan 2018, 08:00 UTC Fedora has pushed to testing new microcode_ctl packages for F26 and F27. They contain the update to upstream 2.1-15.20180108 and include fix for Spectre. - Ubuntu (tl;dr: Patches for Meltdown now available; subsequent patches for Spectre are coming in the future before the kernels are pushed to official release branch)
The first set of updates for 14.04 / 16.04 was broken on some systems, please make sure you update to the very latest kernel packages and avoid the broken ones.
Update - Sun 7 Jan 2018, 22:00 UTC
Release candidate kernels 4.4.x (Trusty HWE / Xenial GA) and 4.13.x (Xenial HWE-edge / Artful GA / Artful HWE) are now publicly available from a dedicated Launchpad PPA and currently contain patches for CVE-2017-5754 aka Meltdown, with support only some architactures. Support for a broader array of architectures and patches for CVE-2017-5715 and CVE-2017-5753 aka Spectre are expected in the near future. After some testing, the patched kernels will be pushed to the main release branch.
Update - Mon 8 Jan 2018, 16:00 UTC
Canonical Ltd. announced that, in order to speed up the patching process for all supported distribution versions and branches, the 4.10.x Xenial HWE kernel will be migrated early to version 4.13.x, thus leaving no supported kernel branch exposed to vulnerabilities. The migration will occur concurrently to the push of patched kernels to the main distribution repositories. In addition, Ubuntu 17.04, aka Zesty Zapus, will reach End Of Life on Sat 13 Jan 2018 and will not receive any kind kernel patch support.- Ubuntu Wiki SecurityTeam KnowledgeBase
- Ubuntu Insights blog - Ubuntu Updates for the Meltdown / Spectre Vulnerabilities
- 17.10: USN-3523-1
- 16.04: USN-3522-1
- 14.04: USN-3522-2
- 16.04/regression: USN-3522-3
- 14.04/regression: USN-3522-4
- Details about CVE-2017-5753 (variant 1, aka "Spectre")
- Details about CVE-2017-5715 (variant 2, aka "Spectre")
- Details about CVE-2017-5754 (variant 3, aka "Meltdown")
- Debian: "Meltdown" fixed in stretch (4.9.65-3+deb9u2, DSA-4078-1), jessie (3.16.51-3+deb8u1, DSA-4082-1) and wheezy (3.2.96-3, DLA-1232-1). "Spectre" mitigations are a work in progress.
- SUSE Advisory
- Scientific Linux:
- 7 - SLSA-2018:0007-1 (kernel), SLSA-2018:0012-1 (microcode_ctl), SLSA-2018:0014-1 (linux-firmware)
- 6 - SLSA-2018:0008-1 (kernel), SLSA-2018:0013-1 (microcode_ctl)
- CoreOS Container Linux: Fixes for Meltdown are available in all release channels now (Alpha 1649.0.0, Beta 1632.1.0, Stable 1576.5.0). Auto-updated systems will receive the releases containing the patch on 2017-01-08. Spectre patches are still WIP.
- NixOS: According to #33414, KPTI is in nixpkgs since 1e129a3.
- Arch Linux Advisory
- Gentoo:
- Oracle Linux (ELSA Security Advisory):
- CloudLinux: Intel CPU Bug - Meltdown and Spectre - KernelCare and CloudLinux
- Parrot Security OS: meltdown/spectre security patches
- Wind River Linux and Pulsar Linux: Wind River Security Vulnerability Notice: Linux Kernel Meltdown and Spectre Break (Side-Channel Attacks)
- XEN - XSA-254 and Xen Project Spectre/Meltdown FAQ, no patches yet
- QEMU - unofficial patch published here, official blog post, discussion on qemu-devel
- VMware - VMSA-2018-0004
- VMSA-2018-0004 supersedes -0002. The ESXi patches will deploy microcode for supported CPUs of the VMHost and for the vCPU presented to the Guest OS when using vHW9 or above (vHW11 recommended) that are cold booted after the patching is complete across the cluster. See KB 52085 for more details on Hypervisor-Assisted Guest Mitigation.
- KB 52245 tracks vSphere status.
- KB 52264 tracks VMware appliance status.
- Update 01/04/18: "OS vendors have begun issuing patches that address CVE-2017-5753, CVE-2017-5715, and CVE-2017-5754 for their operating systems. For these patches to be fully functional in a guest OS additional ESXi and vCenter Server updates will be required. These updates are being given the highest priority. Please sign up to the Security-Announce mailing list to be alerted when these updates are available."
- Red Hat Enterprise Virtualization - Impacts of CVE-2017-5754, CVE-2017-5753, and CVE-2017-5715 to Red Hat Virtualization products
- Citrix XenServer - Citrix XenServer Multiple Security Updates
- Nutanix - Nutanix Security Advisory #0007 v1 - Nutanix Side-Channel Speculative Execution Vulnerabilities
Update - Mon 8 Jan 2018- New Nutanix Security Advisory #0007 v2 - Nutanix Side-Channel Speculative Execution Vulnerabilities
- Virtuozzo - Virtuozzo Addresses Intel Bug Questions
- KVM: Update - Tue 9 Jan 07:50 UTC - Paolo Bonzini, KVM developer, posted in a tweet the following status update for CVE-2017-5715 (Spectre):
- Already in Linus's tree: clearing registers on vmexit
- First wave of KVM fixes here: https://marc.info/?l=kvm&m=151543506500957&w=2
- He is also mentioning that a full solution will require all the Linux parts to be agreed upon, but this will unblock the QEMU updates.
- Mozilla: Mitigations landing for new class of timing attack (blog post), Security Advisory 2018-01, Firefox mitigation update 57.0.4
- Chrome: Actions Required to Mitigate Speculative Side-Channel Attack Techniques
- Microsoft Edge: Mitigating speculative execution side-channel attacks in Microsoft Edge and Internet Explorer
- Webkit (open source browser engine): What Spectre and Meltdown Mean For WebKit
- Brave Browser: New desktop release just out (0.19.131) with various security enhancements, including Strict Site Isolation support.
Update Mon 8 Jan 2018, 13:00 UTC
Tencent's Xuanwu Lab has released a web-based tool that can detect whether your browser is vulnerable to Spectre Attack and can be easily exploited. Official tweet: https://twitter.com/XuanwuLab/status/950345917013504001
- Amazon AWS: Processor Speculative Execution Research Disclosure
- Google Cloud: Google’s Mitigations Against CPU Speculative Execution Attack Methods
- Microsoft Azure: Securing Azure customers from CPU vulnerability
- DigitalOcean: A Message About Intel Security Findings
- Scaleway/Online: Spectre and Meltdown vulnerabilities status
- Linode: CPU Vulnerabilities: Meltdown & Spectre
- Rackspace: Rackspace is Tracking Vulnerabilities Affecting Processors by Intel, AMD and ARM
- OVH: Meltdown, Spectre bug impacting x86-64 CPU - OVH fully mobilised (en), Vulnérabilités Meltdown/Spectre affectant les CPU x86-64 : OVH pleinement mobilisé (fr), Octave Klaba's (OVH CEO) Twitter thread
- Vultr: Intel CPU Vulnerability Alert
- Hetzner: Spectre and Meltdown
- UpCloud: Information regarding the Intel CPU vulnerability (Meltdown)
- Heroku: Meltdown and Spectre Security Update
- Alibaba Cloud: Intel Processor Meltdown and Specter Security Vulnerability Bulletin
- Zscaler: Meltdown and Spectre vulnerabilities: What you need to know
- Gandi: Meltdown and Spectre vulnerabilities
- Intel: INTEL-SA-00088 - Speculative Execution and Indirect Branch Prediction Side Channel Analysis Method, Intel Analysis of Speculative Execution Side Channels (Whitepaper), Intel Issues Updates to Protect Systems from Security Exploits
- AMD: An Update on AMD Processor Security
- ARM: Security Update
- Arista: Security Advisories
- Raspberry Pi: Why Raspberry Pi isn't vulnerable to Spectre or Meltdown
- NVIDIA: Security Notice: Speculative Side Channels, NVIDIA Shield Tablet Security Updates, NVIDIA Shield TV Security Updates, NVIDIA GPU Display Driver Security Updates, NVIDIA Tegra Jetson TX2 L4T Security Updates, NVIDIA Tegra Jetson TX1 L4T and Jetson TK1 L4T Security Updates
- Lenovo: LEN-18282 - Reading Privileged Memory with a Side Channel
- IBM: Central Processor Unit (CPU) Architectural Design Flaws, Potential Impact on Processors in the POWER family
- Huawei: huawei-sn-20180104-01 - Statement on the Media Disclosure of a Security Vulnerability in the Intel CPU Architecture Design
- F5: K91229003 - Side-channel processor vulnerabilities CVE-2017-5715, CVE-2017-5753, and CVE-2017-5754
- Cisco CPU Side-Channel Information Disclosure Vulnerabilities
- Fortigate: CPU hardware vulnerable to Meltdown and Spectre attacks
- Cumulus Linux: Meltdown and Spectre: Modern CPU Vulnerabilities
- Check Point: Check Point Response to Meltdown and Spectre (CVE-2017-5753, CVE-2017-5715, CVE-2017-5754)
- Palo Alto Networks: Information about Meltdown and Spectre findings (PAN-SA-2018-0001)
- HP Enterprise: Side Channel Analysis Method Allows Improper Information Disclosure in Microprocessors (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754), HPESBHF03805 Certain HPE products using Microprocessors from Intel, AMD, and ARM, with Speculative Execution, Elevation of Privilege and Information Disclosure
- Juniper: 2018-01 Out of Cycle Security Bulletin: Meltdown & Spectre: CPU Speculative Execution and Indirect Branch Prediction Side Channel Analysis Method, Meltdown & Spectre: Modern CPU vulnerabilities
- Infoblox: #7346: Spectre/Meltdown Vulnerabilities - CVE-2017-5715, CVE-2017-5753, CVE-2017-5754 (Login required)
- FireEye: FireEye Notice for CVE-2017-5754, CVE-2017-5753, and CVE-2017-5715 (“Meltdown” and “Spectre” vulnerabilities), Community Protection Event (CPE): CPU Security Flaws (Spectre/Meltdown) (Login required)
- Symantec: Meltdown and Spectre: Are Symantec Products Affected?
- Dell: Microprocessor Side-Channel Vulnerabilities (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754): Impact on Dell products
- Dell EMC: Microprocessor Side-Channel Attacks (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754): Impact on Dell EMC products (Dell Enterprise Servers, Storage and Networking)
- NetApp: NTAP-20180104-0001 - Processor Speculated Execution Vulnerabilities in NetApp Products
- ASUS: ASUS Motherboards Microcode Update for Speculative Execution and Indirect Branch Prediction Side Channel Analysis Method
- ASUS: ASUS Servers and Workstations Microcode Update for Speculative Execution and Indirect Branch Prediction Side Channel Analysis Method
- Aruba Networks: ARUBA-PSA-2018-001 - Unauthorized Memory Disclosure through CPU Side-Channel Attacks
- Pure Storage: Advisory (login required)
- Supermicro: Security Vulnerabilities Regarding Side Channel Speculative Execution and Indirect Branch Prediction Information Disclosure
- A10 Networks: SPECTRE/MELTDOWN - CVE-2017-5715/5753/5754
- Avaya: Recent Potential CPU Vulnerabilities: Meltdown and Spectre
- RSA: 000035890 - Microprocessor Side-Channel Attacks (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754): Impact on RSA products (login required)
- Fujitsu: CPU hardware vulnerable to side-channel attacks, 6 SPARC server models listed as t.b.d. p.9
- Veritas Appliance: Veritas Appliance Statement on Meltdown and Spectre
- Schneider Electric: Security Notification: "Meltdown" (CVE-2017-5754) and "Spectre" (CVE-2017-5753 & CVE-2017-5715) - impact to APC products
- Polycom: Security Advisory Relating to the “Speculative Execution” Vulnerabilities with some microprocessors
- Sonicwall: Meltdown and Spectre Vulnerabilities: A SonicWall Alert
- Aerohive Networks: Aerohive's response to Meltdown and Spectre
- Barracuda Networks: Security Advisory
- Netgate: An update on Meltdown and Spectre
- Silver Peak: Security Advisory
- Arbor Networks: Security Advisory (requires support login)
- Extreme Networks: VN 2018-001 (CVE-2017-5715, CVE-2017-5753 - Spectre), VN 2018-002 (CVE-2017-5754 - Meltdown)
- KEMP Technologies: Meltdown And Spectre (CVE-2017-5754 & CVE-2017-5753)
- Pulse Secure: KB43597 - Impact of CVE-2017-5753 (Bounds Check bypass, AKA Spectre), CVE-2017-5715 (Branch Target Injection, AKA Spectre) and CVE-2017-5754 (Meltdown) on Pulse Secure Products
- Nokia: Security Advisory (requires Nokia OLCS login)
- Riverbed: Meltdown/Spectre: Side Channel Attacks against X86 hardware and Linux Kernel (requires Riverbed Support Account)
- CERT/CC: Vulnerability Note VU#584653 - CPU hardware vulnerable to side-channel attacks
- US-CERT: TA18-004A - Meltdown and Spectre Side-Channel Vulnerability Guidance
- CERT-EU: Security Advisory 2018-001 - Meltdown and Spectre Critical Vulnerabilities
- NCSC-UK: Meltdown and Spectre guidance
- CERT-FR: CERTFR-2018-ALE-001 - Multiples vulnérabilités de fuite d’informations dans des processeurs (french only)
- CERT Nazionale: Moderni processori vulnerabili ad attacchi side-channel (italian only)
- CERT-PA: Meltdown e Spectre, vulnerabilità sui microprocessori mettono potenzialmente a rischio informazioni sensibili (italian only)
- SingCERT: Alert on Security Flaws Found in Central Processing Units (CPUs)
- CERT.BE: Central Processor Unit (CPU) Architectural Design Flaws
- CERT-IS: Alvarlegur öryggisgalli í örgjörvum - Meltdown/Spectre (icelandic only)
- MyCERT: MA-691.012018: Alert - CPU Hardware Side-Channel Attacks Vulnerability
Update - Tue 9 Jan 21:50 UTC
Latest Intel microcode update (released 1/8/2018) is 20180108. According to its release notes:
-- Updates upon 20171117 release --
IVT C0 (06-3e-04:ed) 428->42a
SKL-U/Y D0 (06-4e-03:c0) ba->c2
BDW-U/Y E/F (06-3d-04:c0) 25->28
HSW-ULT Cx/Dx (06-45-01:72) 20->21
Crystalwell Cx (06-46-01:32) 17->18
BDW-H E/G (06-47-01:22) 17->1b
HSX-EX E0 (06-3f-04:80) 0f->10
SKL-H/S R0 (06-5e-03:36) ba->c2
HSW Cx/Dx (06-3c-03:32) 22->23
HSX C0 (06-3f-02:6f) 3a->3b
BDX-DE V0/V1 (06-56-02:10) 0f->14
BDX-DE V2 (06-56-03:10) 700000d->7000011
KBL-U/Y H0 (06-8e-09:c0) 62->80
KBL Y0 / CFL D0 (06-8e-0a:c0) 70->80
KBL-H/S B0 (06-9e-09:2a) 5e->80
CFL U0 (06-9e-0a:22) 70->80
CFL B0 (06-9e-0b:02) 72->80
SKX H0 (06-55-04:b7) 2000035->200003c
GLK B0 (06-7a-01:01) 1e->22
Update - Thu 4 Jan 2018, 15:30 UTC
It seems that the new Intel’s microcode archive (2017-12-15) provided with the latest Red Hat’s microcode_ctl update includes three new files: 06-3f-02, 06-4f-01, 06-55-04.
Based on what we know:
- it adds one new CPUID and two MSR for the variant of Spectre that uses indirect branches
- it forces LFENCE to terminate the execution of all previous instructions, thus having the desired effect for the variant of Spectre that uses conditional branches (out-of-bounds-bypass)
Those IDs belong to the following processor microarchitectures: Haswell, Broadwell, Skylake (official reference)
Update - Thu 4 Jan 2018, 16:30 UTC
Regarding AMD's microcode update: it seems to be only for EPYC (maybe Ryzen, not sure!) and it only adds one of the two MSRs (IA32_PRED_CMD). It uses a different bit than Intel's in the CPUID. It is also for Spectre with indirect branches. Previous microprocessors resolved it with a chicken bit. Please note that the same solution implemented at kernel level works for both Intel and AMD.
Update - Fri 5 Jan 2018, 03:35 UTC
Debian Project package maintainers released an updated version of the "intel-microcode" package (version 2017-12-15) for the Sid (unstable) branch olny. Upon inspection, it seems to contain the same microcode additions observed in the Red Hat microcode_ctl update of Thu 4 Jan 2018, 15:30 UTC. The package in compatible with all Debian-based distributions that support post-boot microcode updates.
Some Antiviruses do things that break when installing the Windows patches, therefore Microsoft doesn't automatically install the patches on those systems.
Vendor overview: https://docs.google.com/spreadsheets/d/184wcDt9I9TUNFFbsAVLpzAtckQxYiuirADzf3cL42FQ/htmlview?usp=sharing&sle=true
- Trend Micro: Important Information for Trend Micro Solutions and Microsoft January 2018 Security Updates (Meltdown and Spectre)
- Emsisoft: Chip vulnerabilities and Emsisoft: What you need to know
- Sophos: Advisory - Kernel memory issue affecting multiple OS (aka F..CKWIT, KAISER, KPTI, Meltdown & Spectre)
- Webroot: Microsoft Patch Release - Wednesday, January 3, 2018
- McAfee: Decyphering the Noise Around ‘Meltdown’ and ‘Spectre’ and Meltdown and Spectre – Microsoft update (January 3, 2018) compatibility issue with anti-virus products
- Kaspersky: Compatibility of Kaspersky Lab solutions with the Microsoft Security update of January 9, 2018
- ESET: Meltdown & Spectre: How to protect yourself from these CPU security flaws
- Avira: With our latest product update 15.0.34.17 Avira Antivirus Free, Avira Antivirus Pro and Avira Antivirus Server are compatible with the Microsoft update
- Symantec: Meltdown and Spectre: Are Symantec Products Affected?
- Avast: Meltdown and Spectre: Yes, your device is likely vulnerable
- eScan: Meltdown and Spectre – CPU Vulnerabilities
- Bitdefender: Meltdown and Spectre: decades-old CPU design flaws put businesses at risk
- SQL Server: SQL Server Guidance to protect against speculative execution side-channel vulnerabilities
- Elastic stack: Elastic Cloud and Meltdown
- Couchbase: Speculative Execution Processor Vulnerabilities – ‘Meltdown and Spectre’: What you need to know
- ScyllaDB: The Cost of Avoiding a Meltdown
- Redis Enterprise: Securing Redis Enterprise from Meltdown and Spectre Vulnerabilities
- Redis:
- Synology: Synology-SA-18:01 Meltdown and Spectre Attacks
- Opengear: CVE-2017-5754, CVE-2017-5715, CVE-2017-5753 - Meltdown and Spectre CPU Vulnerabilities
- QNAP: NAS-201801-08 - Security Advisory for Speculative Execution Vulnerabilities in Processors
- Google's Retpoline: a software construct for preventing branch-target-injection (technical write-up)