Meltdown and Spectre vulnerabilities

KB ID: 2427
Version: all
Published: 2018-01-09
Last Modified: 2020-08-13
Get weekly article updates
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam's Privacy Notice.

Cheers for trusting us with the spot in your mailbox!

Now you’re less likely to miss what’s been brewing in our knowledge base with this weekly digest

error icon

Oops! Something went wrong.

Please try again later.

Challenge

Veeam is aware of the side-channel analysis vulnerabilities known as Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753, CVE-2017-5715) affecting most of the modern processors.

Cause

For more information regarding these vulnerabilities please visit security advisories posted by Intel (https://www.intel.com/content/www/us/en/architecture-and-technology/facts-about-side-channel-analysis-and-intel-products.html), AMD (http://www.amd.com/en/corporate/speculative-execution), Microsoft (https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002), VMware (https://www.vmware.com/security/advisories/VMSA-2018-0002.html). Veeam recommends applying all latest operating system security patches and firmware updates right away to avoid security breaches, however these updates might introduce reduction in CPU performance.

As part of our regular process, Veeam development team conducts performance analysis of the available patches on servers with installed Veeam products. We will continue to update further, as more details become available.

Preliminary tests in our lab haven't shown any significant performance degradation on Veeam components after applying the patches. However, the performance impact may be noticeable depending on the hardware configuration. 

As of January 23, 2018, Intel does not recommend installing patches:

"We recommend that OEMs, cloud service providers, system manufacturers, software vendors and end users stop deployment of current versions, as they may introduce higher than expected reboots and other unpredictable system behavior."

 

More information

Deployed Linux appliances: no patches are currently required, since only root can log in to these appliances. To protect other VMs running on the same host from getting into each other’s memory, patching the host is required.
 
Click here to send feedback regarding this KB, or suggest content for a new KB.
To report a typo on this page, highlight the typo with your mouse and press CTRL + Enter.

Spelling error in text

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Thank you!

Thank you!

Your feedback has been received and will be reviewed.

Oops! Something went wrong.

Please try again later.

KB Feedback/Suggestion

This form is only for KB Feedback/Suggestions, if you need help with the software open a support case

By submitting, you are agreeing to have your personal information managed in accordance with the terms of Veeam's Privacy Notice.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Verify your email to continue your product download
We've sent a verification code to:
  • Incorrect verification code. Please try again.
An email with a verification code was just sent to
Didn't receive the code? Click to resend in sec
Didn't receive the code? Click to resend
Thank you!

Thank you!

Your feedback has been received and will be reviewed.

error icon

Oops! Something went wrong.

Please try again later.