If you are using Linux-based virtualization (KVM), besides requiring updated kernel and Intel microcode (which is not yet available), you would also need updates for relevant layers: QEMU and libvirt. Patches are posted[1][2].<p>Virtual Machines now need to be exposed a new Intel CPU feature flag: 'ssbd' (Speculative Store Bypass Disable).<p>On microcode, from Red Hat's blog post[3]:<p><i>In many (but not all) cases, full mitigation will also require updated microcode from the system microprocessor vendor. Red Hat intends to ship updated microcode as a convenience to our customers as it is made available to us. In the interim, customers are strongly advised to contact their OEM, ODM, or system manufacturer to receive this via a system BIOS update.</i><p>[1] <a href="https://www.redhat.com/archives/libvir-list/2018-May/msg01560.html" rel="nofollow">https://www.redhat.com/archives/libvir-list/2018-May/msg0156...</a><p>[2] <a href="https://lists.gnu.org/archive/html/qemu-devel/2018-05/msg04795.html" rel="nofollow">https://lists.gnu.org/archive/html/qemu-devel/2018-05/msg047...</a><p>[3] <a href="https://www.redhat.com/en/blog/speculative-store-bypass-explained-what-it-how-it-works" rel="nofollow">https://www.redhat.com/en/blog/speculative-store-bypass-expl...</a>