The recent disclosed security issues, known as Meltdown and Spectre, affects most hypervisors in a virtualised environment. It allows of information disclosure between virtual machines on the same hosts or between processes within a same virtual machine. Exploiting the security issue requires an attacker to load and run malicious programs on affected systems.
A successful attack could lead to arbitrary code execution, elevation of privilege, or information disclosure.
Some product vendors have provided information on the patches of the vulnerabilities for their products as listed below. The list is not exhaustive and it is recommended to consult the product vendors to confirm the availability of patches.
System administrators should apply the patches once available or follow the recommendations provided by the product vendors to mitigate the risk.
https://googleprojectzero.blogspot.hk/2018/01/reading-privileged-memory-with-side.html
https://meltdownattack.com/
https://spectreattack.com/
https://www.hkcert.org/my_url/zh/alert/18010401
https://www.us-cert.gov/ncas/alerts/TA18-004A
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754