Spectre and Meltdown.
Where do we start? a bad, I mean very bad press release of something that may or may not affect your computer, workstation, server or server in cloud. Yes it totally is but you have to have local access to the CPU associated, that may be a PC or a Phone it seems, Apple has been made an example but lets think its ARM CPU, so thats every Mobile platform that supports the (feature/microcode exposure/too much control over the CPU from the OS/etc/etc)
The Application has to be running on the CPU of the device so I would think console access, or at least remote user who accesses the system, input device access....
At this time, the only known way to exploit these vulnerabilities is from local/directly access the CPU(Again can be remote once you have SSH/VNC etc)
Below are the patches I have found so far.
VMWare has released a security advisory for their ESXi, Workstation and Fusion products: VMSA-2018-0002
[https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html][1]
RedHat has released a security advisory for their qemu product: [https://access.redhat.com/errata/RHSA-2018:0024][1]
Amazon has released a security advisory for their Amazon Linux AMI product: ALAS-2018-939
https://alas.aws.amazon.com/ALAS-2018-939.html
Now this has to be the best response to the issue at hand right now
What did our BSD friends say?
Bad google ;(
a Powershell check for the same ;)
The Linux Kernel Ok, we had an interesting week, and by now everybody knows why we were
merging all those odd x86 page table isolation patches without
following all of the normal release timing rules.
I may/will come back and edit this post. I am sure the non-issue (until in the wild) wont be a real problem long tern. Google should really have followed disclosure release dates here! -1 for Google