Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Trend Micro Deep Security Linux Kernel Compatibility for Meltdown and Spectre

    • Updated:
    • 22 Feb 2018
    • Product/Version:
    • Deep Security 10.All
    • Deep Security 9.All
    • Platform:
    • Amazon AMI 32-bit
    • Amazon AMI 64-bit
    • CentOS 5.4 32-bit
    • CentOS 5.4 64-bit
    • CentOS 5.5 32-bit
    • CentOS 5.5 64-bit
    • CentOS 5.6 32-bit
    • CentOS 5.6 64-bit
    • CentOS 5.7 32-bit
    • CentOS 5.7 64-bit
    • CentOS 5.8 32-bit
    • CentOS 5.8 64-bit
    • CentOS 6 32-bit
    • CentOS 6 64-bit
    • CentOS 6.1 32-bit
    • CentOS 6.1 64-bit
    • CentOS 6.2 32-bit
    • CentOS 6.2 64-bit
    • CentOS 7.0 64-bit
    • Linux All
    • Linux すべて
    • Linux - Red Hat RHEL 4 32-bit
    • Linux - Red Hat RHEL 4 64-bit
    • Linux - Red Hat RHEL 5 32-bit
    • Linux - Red Hat RHEL 5 64-bit
    • Linux - Red Hat RHEL 6 32-bit
    • Linux - Red Hat RHEL 6 64-bit
    • Linux - Red Hat RHEL 7 64-bit
    • Linux - SuSE 10
    • Linux - SuSE 10 64-bit
    • Linux - SuSE 11
    • Linux - SuSE 11 64-bit
    • Oracle Linux 5 32-bit
    • Oracle Linux 5 64-bit
    • Oracle Linux 6 32-bit
    • Oracle Linux 6 64-bit
    • Ubuntu 10.04 64-bit
    • Ubuntu 12.04 64-bit
Summary
Last updated:  February 22 @ 4:00AM GMT
Linux operating system (OS) vendors have begun to release patches and updated kernels to address recently disclosed processor vulnerabilities, commonly referred to as Meltdown and Spectre.   
The following solution outlines the latest known vendor patches and kernels for CVE-2017-5754, CVE-2017-5753, and CVE-2017-5715, which are currently supported by the latest versions of Trend Micro Deep Security.
Links to the complete list of Deep Security supported kernels can also be found below.
Details
Public

Vendor Patches

The following tables lists the known patch versions that address Meltdown and Spectre and are supported by Trend Micro Deep Security:

 

PlatformPatch
Amazon x324.9.76-3.78.amzn1
Amazon x64
4.9.76-3.78.amzn1
Ubuntu16
4.4.0-108-generic
4.4.0-109-generic
4.13.0-26-generic
4.4.0-1048-aws
4.13.0-1005-azure
Ubuntu14
4.4.0-108-generic
4.4.0-109-generic
4.13.0-26-generic
4.4.0-1048-aws
4.13.0-1005-azure
Red Hat 6 x32*
2.6.32-696.18.7.el6.i686
Red Hat 6 x64*
2.6.32-696.18.7.el6.x86_64
Red Hat 7 x64*
3.10.0-693.11.6.el7.x86_64
3.10.0-693.11.6.el7.centos.plus.x86_64
Oracle 6 x32
2.6.32-696.18.7.el6.i686
Oracle 6 x64
2.6.32-696.18.7.el6.x86_64
4.1.12-112.14.5.el6
4.1.12-112.14.10.el7
Oracle 7 x64
3.10.0-693.11.6.el7.x86_64
4.1.12-112.14.5.el7
4.1.12-112.14.10.el7
4.1.12-112.14.11.el7
SuSE 11 x32
3.0.101-0.47.106.11-default (SP3-LTSS)
3.0.101-108.21-default (SP4)
SuSE 11 x64
3.0.101-0.47.106.11-default (SP3-LTSS)
3.0.101-108.21-default (SP4)
SuSE 12 x64
4.4.114-94.11-default (SP2)
4.4.103-6.38-default
4.4.103-92.56-default
3.12.74-60.64.69-default
Cloud Linux 6 x32
2.6.32-896.16.1.lve1.4.50.el6.i686
Cloud Linux 6 x64
2.6.32-896.16.1.lve1.4.50.el6.x86_64
Cloud Linux 7 x64
3.10.0-714.10.2.lve1.4.79.el7.x86_64
*Includes CentOS

 

Deep Security Supported Linux Kernels

The latest Linux kernels supported by Trend Micro Deep Security can be always be found at the following links:

Premium
Internal
Rating:
Category:
Update
Solution Id:
1119250
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.