A List To See If You’re Still Vulnerable To Meltdown And Spectre

A List To See If You’re Still Vulnerable To Meltdown And Spectre
Image: TiggerT/Flickr

Security researchers revealed disastrous flaws in processors manufactured by Intel and other companies this week. The vulnerabilities, which were discovered by Google’s Project Zero and nicknamed Meltdown and Spectre, can cause data to leak from kernel memory — which is really not ideal since the kernel is central to operating systems and handles a bunch of sensitive processes.

Intel says that it’s working to update all of the processors it has introduced in the last few years. “By the end of next week, Intel expects to have issued updates for more than 90 per cent of processor products introduced within the past five years,” the company said in a statement today.

Unfortunately, Meltdown and Spectre impact a ton of different products — cloud services, computers, phones, and browsers. Luckily, in many cases, consumers won’t have to do much to secure their devices and services; they will just need to keep an eye out for updates and install them when they become available. In some cases, you may simply be out of luck.

Operating Systems


Apple hasn’t spoken publicly about Meltdown and Spectre yet (we’ve asked), but Apple Insider reports that the vulnerabilities are at least partially mitigated in macOS High Sierra 10.13.2, and that more fixes are coming in 10.13.3.


Microsoft typically puts out its security updates on Patch Tuesday (which is coming next week) but has some emergency patches out now.

“Microsoft has not received any information to indicate that these vulnerabilities have been used to attack customers at this time,” the company said in a security advisory. “Microsoft continues working closely with industry partners including chip makers, hardware OEMs, and app vendors to protect customers. To get all available protections, hardware/firmware and software updates are required.”

Microsoft says Windows 7 Service Pack 1, Windows 8.1, and Windows 10 all need updates (the update for Windows 10 is here). Most Surface users receive auto-updates and information about those updates is available here.

Unfortunately, users who are running Windows on machines not manufactured by the company will also need a firmware update, and the release of those will vary based on the manufacturer. Microsoft recommends contacting the device manufacturer for information, which… good luck, I guess.

There’s also another weird wrinkle in the Microsoft update process — some anti-virus software might mess with the updates.

“Microsoft is only offering the Windows security updates released on January 3, 2018 to devices running anti-virus software from partners who have confirmed their software is compatible with the January 2018 Windows operating system security update,” Microsoft explained. “If you have not been offered the security update, you may be running incompatible anti-virus software and you should follow up with your software vendor.”

Security architect Kevin Beaumont is running a helpful spreadsheet that shows which anti-virus vendors are compatible with the Microsoft update.

Google Chrome OS

To be protected against Meltdown and Spectre, you need Chrome OS 63, which rolled out in December 2017. Some older devices will get patches soon, while others aren’t getting patched at all. You can check your specific device here (look out for end of life, or EoL, in the auto-update column or the ‘KPTI eventually?’ column — it means your device probably isn’t gonna get a patch).


There aren’t patches for Ubuntu yet, but those are coming soon.

“The original coordinated disclosure date was planned for January 9 and we have been driving toward that date to release fixes. Due to the early disclosure, we are trying to accelerate the release, but we don’t yet have an earlier ETA when the updates will be released. We will release Ubuntu Security Notices when the updates are available,” Ubuntu said.

Mobile OS


Apple hasn’t yet commented on whether Meltdown and Spectre affect iOS, and if so, which iPhone models are impacted. Gizmodo asked Apple to comment and will update when we hear back.


“On the Android platform, exploitation has been shown to be difficult and limited on the majority of Android devices,” Google said.

The company pushed out a patch to manufacturers of Android phones in December 2017, but the Android security update process can be notoriously slow because manufacturers all have their own update schedules, and some old Android devices might not get updates at all. However, older Android devices that haven’t been updated in a while are also likely vulnerable to a host of other bugs — they’re not likely to be targeted with a Meltdown or Spectre exploit when an attacker could easily choose a less complex method.

Android users with Pixel or Nexus devices will get their patches sometime this month, according to Google. Nexus users need to accept the update; Pixel users will get it automatically but need to reboot their devices for the update to complete.

“We have had no reports of active customer exploitation or abuse of these newly reported issues,” Google noted.



Chrome 64 is scheduled for release on January 23 and will include protection from Meltdown and Spectre exploits.

In the meantime, Chrome has an optional feature called site isolation that can offer some protection but might also cause performance problems, particularly in Chrome on Android. Site isolation sandboxes websites into different processes, which “makes it harder for untrusted websites to access or steal information from your accounts on other websites,” according to Google.

“With Site Isolation enabled, the data exposed to speculative side-channel attacks are reduced as Chrome renders content for each open website in a separate process,” Google explained.

If you’re ok with trading performance issues for better security, you can enable site isolation here.


Apple, what’s up? Call us, babe.


Mozilla rolled out Firefox 57 in November 2017, which contains what the company calls a “partial, short-term mitigation” for the vulnerabilities.

“The full extent of this class of attack is still under investigation and we are working with security researchers and other browser vendors to fully understand the threat and fixes,” Mozilla software engineer Luke Wagner wrote in a blog post. “In the longer term, we have started experimenting with techniques to remove the information leak closer to the source.”

Microsoft Edge and Internet Explorer

Updates are available for both Edge and Internet Explorer 11.

“We are making changes to the behaviour of supported versions of Microsoft Edge and Internet Explorer 11 to mitigate the ability to successfully read memory through this new class of side-channel attacks,” Edge’s principal project manager, John Hazen, wrote in a blog post. “We will continue to evaluate the impact of the CPU vulnerabilities published today, and introduce additional mitigations accordingly in future servicing releases.”

Cloud Services

This is where stuff with Meltdown and Spectre gets really messy — but also where consumers will see the least impact.

Amazon Web Services

Most AWS instances are already secured, Amazon said in a security bulletin. However, customers do need to take some action to secure their data.

“While the updates AWS performs protect underlying infrastructure, in order to be fully protected against these issues, customers must also patch their instance operating systems,” Amazon explained.

Microsoft Azure

Like AWS, most of Azure’s infrastructure has already been updated, Microsoft said.

“Some aspects of Azure are still being updated and require a reboot of customer VMs for the security update to take effect. Many of you have received notification in recent weeks of a planned maintenance on Azure and have already rebooted your VMs to apply the fix, and no further action by you is required,” Microsoft added.

Google Cloud Platform

Some Google Cloud products are already secured, while others require customers to take action — particularly Google Compute Engine, Google Kubernetes Engine, Google Cloud Dataflow, and Google Cloud Dataproc.


  • From Microsoft – To get all available protections, hardware/firmware and software updates are required. This includes microcode from device OEMs and, in some cases, updates to antivirus software as well. – So what Hardware/Firmware updates do we need? There is no clear instruction on exactly which hardware may be vulnerable.

  • The Windows 10 update was out almost immediately after the hysteria started setting fire to the internet… I was actually surprised how quick Microsoft got that out to people.

    I mean sure they were probably let into the loop on this thing a little bit ahead of the rest of us, but still.

    • All of them were in the loop beforehand. The Ubuntu statement hints at this: the release of patches was planned for 9 January and disclosure was supposed to happen at the same time, but someone broke disclosure early which is why they’re all scrambling to release fixes ahead of schedule.

      • I don’t think it’s so much that someone broke disclosure, people were poking around the commits to a linux distros or something similar and started piecing it together. I saw a thread on reddit about people discussing it the day before the sky fell in.

        • Maybe so. For disclosure-sensitive things you can develop in a restricted fork, so if they were doing this work in the public repo then that’s bad planning on their part. Especially since the tone they take in their statement is one of frustration that the details were disclosed prematurely.

    • A Google researcher discovered it in June last year or somewhere near there are told Intel immediately. They’ve known for a long time.

    • A particular set of software-driven behaviours triggers an unexpected race condition in the CPU that allows, under very specific circumstances, for memory outside the user space to be read. The problem isn’t really an architectural flaw, but can be fixed in future in the hardware itself. In the meantime, software and firmware updates can provide workarounds.

    • Hardware is bad. We can sort of work around it and mitigate the circumstances that cause it. Update your OS and browser and firmware. New CPU’s without this issue are expected in about 5 years.

    • AMD is affected by Spectre but not Meltdown. To my knowledge, a firmware fix is needed in addition to a software fix.

Show more comments

Log in to comment on this story!