Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
https://www.synology.com/support/security/Synology_SA_18_01
https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.kb.cert.org/vuls/id/180049
https://www.debian.org/security/2018/dsa-4188
https://www.debian.org/security/2018/dsa-4187
https://usn.ubuntu.com/usn/usn-3516-1/
https://usn.ubuntu.com/3597-2/
https://usn.ubuntu.com/3597-1/
https://usn.ubuntu.com/3580-1/
https://usn.ubuntu.com/3549-1/
https://usn.ubuntu.com/3542-2/
https://usn.ubuntu.com/3542-1/
https://usn.ubuntu.com/3541-2/
https://usn.ubuntu.com/3541-1/
https://usn.ubuntu.com/3540-2/
https://usn.ubuntu.com/3540-1/
https://support.lenovo.com/us/en/solutions/LEN-18282
https://support.f5.com/csp/article/K91229003
https://support.citrix.com/article/CTX231399
https://spectreattack.com/
https://security.netapp.com/advisory/ntap-20180104-0001/
https://security.gentoo.org/glsa/201810-06
https://seclists.org/bugtraq/2019/Jun/36
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
https://cert.vde.com/en-us/advisories/vde-2018-003
https://cert.vde.com/en-us/advisories/vde-2018-002
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
https://access.redhat.com/security/vulnerabilities/speculativeexecution
https://access.redhat.com/errata/RHSA-2018:0292
http://xenbits.xen.org/xsa/advisory-254.html
http://www.securitytracker.com/id/1040071
http://www.securityfocus.com/bid/102371
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.kb.cert.org/vuls/id/584653
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
http://nvidia.custhelp.com/app/answers/detail/a_id/4614
http://nvidia.custhelp.com/app/answers/detail/a_id/4613
http://nvidia.custhelp.com/app/answers/detail/a_id/4611
http://nvidia.custhelp.com/app/answers/detail/a_id/4609