-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ VMware Security Advisory Advisory ID: VMSA-2018-0007 Severity: Important Synopsis: VMware Virtual Appliance updates address side-channel analysis due to speculative execution Issue date: 2018-02-08 Updated on: 2018-02-08 (Initial Advisory) CVE number: CVE-2017-5753, CVE-2017-5715, CVE-2017-5754 1. Summary VMware Virtual Appliance updates address side-channel analysis due to speculative execution Note: This document will focus on VMware Virtual Appliances which are affected by the known variants of CVE-2017-5753, CVE-2017-5715, and CVE-2017-5754. For more information please see Knowledge Base article 52264. These mitigations are part of the Operating System-Specific Mitigations category described in VMware Knowledge Base article 52245. 2. Relevant Products vCloud Usage Meter (UM) Identity Manager (vIDM) vCenter Server (vCSA) vSphere Data Protection (VDP) vSphere Integrated Containers (VIC) vRealize Automation (vRA) 3. Problem Description VMware Virtual Appliance Mitigations for Bounds-Check bypass, Branch Target Injection, and Rogue data cache load issues CPU data cache timing can be abused to efficiently leak information out of mis-speculated CPU execution, leading to (at worst) arbitrary virtual memory read vulnerabilities across local security boundaries in various contexts. (Speculative execution is an automatic and inherent CPU performance optimization used in all modern processors.) Successful exploitation may allow for information disclosure. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifiers CVE-2017-5753 (Bounds Check bypass), CVE-2017-5715 (Branch Target Injection), CVE-2017-5754 (Rogue data cache load) to these issues. Column 5 of the following table lists the action required to mitigate the observed vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigation/ Product Version on Severity Apply Patch Workaround ========== ========= ======= ========= ============= ========== UM 3.x VA Important Patch Pending KB52467 vIDM 3.x, 2.x VA Important Patch Pending KB52284 vCSA 6.5 VA Important Patch Pending KB52312 vCSA 6.0 VA Important Patch Pending KB52312 vCSA 5.5 VA N/A Unaffected None VDP 6.x VA Important Patch Pending None VIC 1.x VA Important 1.3.1 None vRA 7.x VA Important Patch Pending KB52377 vRA 6.x VA Important Patch Pending KB52497 4. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. vSphere Integrated Containers 1.3.1 Downloads and Documentation: https://my.vmware.com/group/vmware/get-download?downloadGroup=VIC131 5. References http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754 https://kb.vmware.com/kb/52264 https://kb.vmware.com/kb/52245 https://kb.vmware.com/kb/52467 https://kb.vmware.com/kb/52284 https://kb.vmware.com/kb/52312 https://kb.vmware.com/kb/52377 https://kb.vmware.com/kb/52497 https://kb.vmware.com/kb/52497 - ------------------------------------------------------------------------ 6. Change log 2018-02-08: VMSA-2018-0007 Initial security advisory in conjunction with the release of vSphere Integrated Containers 1.3.1 on 2018-02-08. - ------------------------------------------------------------------------ 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce@lists.vmware.com bugtraq@securityfocus.com fulldisclosure@seclists.org E-mail: security at vmware.com PGP key at: https://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html VMware Security & Compliance Blog https://blogs.vmware.com/security Twitter https://twitter.com/VMwareSRC Copyright 2018 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- iF0EARECAB0WIQSmJMaUX5+xuU/DnNwMRybxVuL2QwUCWnzCYQAKCRAMRybxVuL2 Q9MwAKCpJO5F7S84R0BU0cmxC6YZD48OmQCg7m5F+rjhYXd3h11mD89Fi8ZGU+g= =4l0P -----END PGP SIGNATURE----- _______________________________________________ Security-announce mailing list Security-announce@lists.vmware.com https://lists.vmware.com/mailman/listinfo/security-announce