Sign In

Съвети


VMware Releases Security Advisory


VMware has released security advisory relating to  vCenter Server, ESXi, Workstation and Fusion. Updates of vCenter Server, ESXi, Workstation and Fusion virtualize the new speculative-execution control mechanism for Virtual Machines (VMs). As a result, a patched Guest Operating System (Guest OS) can remediate the Branch Target Injection issue (CVE-2017-5715). This issue may allow for information disclosure between processes within the VM.

To remediate CVE-2017-5715 in the Guest OS the following VMware and third party requirements must be met:

VMware Requirements

  1. Deploy the updated version of vCenter Server listed in the table (if vCenter Server is used).
  2. Deploy the ESXi patches and/or the new versions for Workstation or Fusion listed in the table.
  3. Ensure that your VMs are using Hardware Version 9 or higher. For best performance, Hardware Version 11 or higher is recommended.

Third party Requirements

  1. Deploy the Guest OS patches for CVE-2017-5715. These patches are to be obtained from your OS vendor.
  2. Update the CPU microcode. Additional microcode is needed for your CPU to be able to expose the new MSRs that are used by the patched Guest OS. This microcode should be available from your hardware platform vendor.

VMware is providing several versions of the required microcode from INTEL and AMD through ESXi patches listed in the table.

Product

Version

Running

on

Severity

Replace with/ 
Apply patch

 VC 

6.5 

Any 

Important 

6.5 U1e *

 VC 

6.0 

Any 

Important 

6.0 U3d *

 VC 

5.5 

Any 

Important 

5.5 U3g *

 ESXi 

6.5 

Any 

Important 

ESXi650-201801401-BG
ESXi650-201801402-BG **

 ESXi 

6.0 

Any 

Important 

ESXi600-201801401-BG 
ESXi600-201801402-BG **

 ESXi 

5.5 

Any 

Important 

ESXi550-201801401-BG **

 Workstation

14.x 

Any 

Important 

14.1.1 

 Workstation

12.x 

Any 

Important 

patch planned 

 Fusion 

10.x 

OS X

Important 

10.1.1 

 Fusion 

8.x 

OS X

Important 

8.5.10 

   * The new versions of vCenter Server set restrictions on ESXi hosts  joining an Enhanced vMotion Cluster, see VMware Knowledge Base article 52085 for details.

  ** These ESXi patches install the microcodes if present for your CPU, see VMware Knowledge Base article 52085.

CERT Bulgaria recommends users and administrators to review the VMware Security Advisories VMSA-2018-0004 and apply the necessary actions.

https://www.vmware.com/security/advisories/VMSA-2018-0004.html

https://kb.vmware.com/s/article/52085

10/01/2018

NEW VIRUSES RSS
VULNERABILITIES RSS