VMware Security Announcements: VMSA-2018-0004.3

https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html

VMware vSphere, Workstation and Fusion updates add Hypervisor-Assisted Guest Mitigations for speculative execution issue.The mitigations in this advisory are categorized as Hypervisor-Assisted Guest Mitigations described by VMware Knowledge Base article 52245.

Relevant Products
  • VMware vCenter Server (VC)
  • VMware vSphere ESXi (ESXi)
  • VMware Workstation Pro / Player (Workstation)
  • VMware Fusion Pro / Fusion (Fusion)
Problem Description

New speculative-execution control mechanism for Virtual Machines

Updates of vCenter Server, ESXi, Workstation and Fusion virtualize the new speculative-execution control mechanism for Virtual Machines (VMs). As a result, a patched Guest Operating System (Guest OS) can remediate the Branch Target Injection issue (CVE-2017-5715). This issue may allow for information disclosure between processes within the VM.

To remediate CVE-2017-5715 in the Guest OS the following VMware and third party requirements must be met. Please note that these points are meant to be a brief overview. For a more in-depth explanation of the mitigation process please see VMware Knowledge Base Article 52085.

Updated security advisory in conjunction with the release of ESXi 6.5, 6.0, and 5.5 patches and vCenter 6.5 U1g, 6.0 U3e, and 5.5 U3h

Comments are closed.