<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<style type="text/css" style="display:none;"><!-- P {margin-top:0;margin-bottom:0;} --></style>
</head>
<body dir="ltr">
<div id="divtagdefaultwrapper" style="font-size:8pt;color:#000000;font-family:'Courier New',monospace;" dir="ltr">
<p style="margin-top:0;margin-bottom:0"></p>
<div>-----BEGIN PGP SIGNED MESSAGE-----</div>
<div>Hash: SHA1</div>
<div><br>
</div>
<div>- ------------------------------------------------------------------------</div>
<div> VMware Security Advisory</div>
<div><br>
</div>
<div>Advisory ID: VMSA-2018-0012.1</div>
<div>Severity: Moderate</div>
<div>Synopsis: VMware vSphere, Workstation and Fusion updates enable</div>
<div> Hypervisor-Assisted Guest Mitigations for Speculative Store</div>
<div> Bypass issue</div>
<div>Issue date: 2018-05-21</div>
<div>Updated on: 2018-06-28</div>
<div>CVE number: CVE-2018-3639</div>
<div><br>
</div>
<div>1. Summary</div>
<div><br>
</div>
<div> VMware vSphere, Workstation and Fusion updates enable Hypervisor-</div>
<div> Assisted Guest Mitigations for Speculative Store Bypass issue.</div>
<div><br>
</div>
<div> The mitigations in this advisory are categorized as Hypervisor-</div>
<div> Assisted Guest Mitigations described by VMware Knowledge Base article</div>
<div> 54951. KB54951 also covers CVE-2018-3640 mitigations which do not</div>
<div> require VMware product updates.</div>
<div><br>
</div>
<div>2. Relevant Products</div>
<div><br>
</div>
<div> VMware vCenter Server (VC)</div>
<div> VMware vSphere ESXi (ESXi)</div>
<div> VMware Workstation Pro / Player (Workstation)</div>
<div> VMware Fusion Pro / Fusion (Fusion)</div>
<div><br>
</div>
<div>3. Problem Description</div>
<div><br>
</div>
<div> vCenter Server, ESXi, Workstation, and Fusion update speculative</div>
<div> execution control mechanism for Virtual Machines (VMs). As a result,</div>
<div> a patched Guest Operating System (GOS) can remediate the Speculative</div>
<div> Store bypass issue (CVE-2018-3639) using the Speculative-Store-</div>
<div> Bypass-Disable (SSBD) control bit. This issue may allow for</div>
<div> information disclosure in applications and/or execution runtimes</div>
<div> which rely on managed code security mechanisms. Based on current</div>
<div> evaluations, we do not believe that CVE-2018-3639 could allow for VM</div>
<div> to VM or Hypervisor to VM Information disclosure.</div>
<div><br>
</div>
<div> The Common Vulnerabilities and Exposures project (cve.mitre.org) has</div>
<div> assigned the identifier CVE-2018-3639 to this issue.</div>
<div><br>
</div>
<div> Column 5 of the following table lists the action required to</div>
<div> remediate the vulnerability in each release, if a solution is</div>
<div> available.</div>
<div> </div>
<div> VMware Product Running Replace with/ Mitigation/</div>
<div> Product Version on Severity Apply Patch Workaround</div>
<div> =========== ======= ======= ======== ==================== ==========</div>
<div> VC 6.7 Any Moderate 6.7.0b * None</div>
<div> VC 6.5 Any Moderate 6.5 U2b * None</div>
<div> VC 6.0 Any Moderate 6.0 U3f * None</div>
<div> VC 5.5 Any Moderate 5.5 U3i * None</div>
<div><br>
</div>
<div> ESXi 6.7 Any Moderate ESXi670-201806401-BG * None</div>
<div> ESXi670-201806402-BG **</div>
<div> ESXi 6.5 Any Moderate ESXi650-201806401-BG * None</div>
<div> ESXi650-201806402-BG **</div>
<div> ESXi 6.0 Any Moderate ESXi600-201806401-BG * None</div>
<div> ESXi600-201806402-BG **</div>
<div> ESXi 5.5 Any Moderate ESXi550-201806401-BG * None</div>
<div> ESXi550-201806402-BG **</div>
<div> </div>
<div> Workstation 14.x Any Moderate 14.1.2 * None</div>
<div> Fusion 10.x OSX Moderate 10.1.2 * None</div>
<div><br>
</div>
<div> * There are additional VMware and 3rd party requirements for</div>
<div> CVE-2018-3639 mitigation beyond applying these updates. Please</div>
<div> see VMware Knowledge Base article 55111 for details.</div>
<div> </div>
<div> ** If available, these ESXi patches apply the required microcode</div>
<div> updates. The included microcode updates are documented in the</div>
<div> VMware Knowledge Base articles listed in the Solution section. </div>
<div><br>
</div>
<div>4. Solution</div>
<div><br>
</div>
<div> Please review the patch/release notes for your product and</div>
<div> version and verify the checksum of your downloaded file.</div>
<div><br>
</div>
<div> vCenter Server 6.7.0b</div>
<div> Downloads:</div>
<div> </div>
<div>https://my.vmware.com/web/vmware/details?downloadGroup=VC670B&productId=742</div>
<div>&rPId=24511</div>
<div> Documentation:</div>
<div> </div>
<div>https://docs.vmware.com/en/VMware-vSphere/6.7/rn/vsphere-vcenter-server-670</div>
<div>b-release-notes.html</div>
<div><br>
</div>
<div> vCenter Server 6.5 U2b</div>
<div> Downloads:</div>
<div> </div>
<div>https://my.vmware.com/web/vmware/details?downloadGroup=VC65U2B&productId=61</div>
<div>4&rPId=24437</div>
<div> Documentation:</div>
<div> </div>
<div>https://docs.vmware.com/en/VMware-vSphere/6.5/rn/vsphere-vcenter-server-65u</div>
<div>2b-release-notes.html</div>
<div><br>
</div>
<div> vCenter Server 6.0 U3f</div>
<div> Downloads:</div>
<div> </div>
<div>https://my.vmware.com/web/vmware/details?downloadGroup=VC60U3F&productId=49</div>
<div>1&rPId=24398</div>
<div> Documentation:</div>
<div> </div>
<div>https://docs.vmware.com/en/VMware-vSphere/6.0/rn/vsphere-vcenter-server-60u</div>
<div>3f-release-notes.html</div>
<div><br>
</div>
<div> vCenter Server 5.5 U3i</div>
<div> Downloads:</div>
<div> </div>
<div>https://my.vmware.com/web/vmware/details?downloadGroup=VC55U3I&productId=35</div>
<div>3&rPId=24327</div>
<div> Documentation:</div>
<div> </div>
<div>https://docs.vmware.com/en/VMware-vSphere/5.5/rn/vsphere-vcenter-server-55u</div>
<div>3i-release-notes.html</div>
<div><br>
</div>
<div> VMware ESXi 6.7</div>
<div> Downloads:</div>
<div> https://my.vmware.com/group/vmware/patch</div>
<div> Documentation:</div>
<div> https://kb.vmware.com/kb/55920</div>
<div> https://kb.vmware.com/kb/55921 (microcode)</div>
<div><br>
</div>
<div> VMware ESXi 6.5</div>
<div> Downloads:</div>
<div> https://my.vmware.com/group/vmware/patch</div>
<div> Documentation:</div>
<div> https://kb.vmware.com/kb/55915</div>
<div> https://kb.vmware.com/kb/55916 (microcode)</div>
<div><br>
</div>
<div> VMware ESXi 6.0</div>
<div> Downloads:</div>
<div> https://my.vmware.com/group/vmware/patch</div>
<div> Documentation:</div>
<div> https://kb.vmware.com/kb/55910</div>
<div> https://kb.vmware.com/kb/55911 (microcode)</div>
<div><br>
</div>
<div> VMware ESXi 5.5</div>
<div> Downloads:</div>
<div> https://my.vmware.com/group/vmware/patch</div>
<div> Documentation:</div>
<div> https://kb.vmware.com/kb/55905</div>
<div> https://kb.vmware.com/kb/55906 (microcode)</div>
<div><br>
</div>
<div> VMware Workstation Pro, Player 14.1.2</div>
<div> Downloads and Documentation:</div>
<div> https://www.vmware.com/go/downloadworkstation</div>
<div> https://www.vmware.com/go/downloadplayer</div>
<div><br>
</div>
<div> VMware Fusion Pro / Fusion 10.1.2</div>
<div> Downloads and Documentation: </div>
<div> https://www.vmware.com/go/downloadfusion</div>
<div><br>
</div>
<div>5. References</div>
<div><br>
</div>
<div> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639</div>
<div> https://kb.vmware.com/kb/54951</div>
<div> https://kb.vmware.com/kb/55111</div>
<div><br>
</div>
<div>- ------------------------------------------------------------------------</div>
<div><br>
</div>
<div>6. Change log</div>
<div><br>
</div>
<div> 2018-05-21: VMSA-2018-0012</div>
<div> Initial security advisory in conjunction with the release</div>
<div> of Workstation 14.1.2 and Fusion 10.1.2 on 2018-05-21.</div>
<div><br>
</div>
<div> 2018-06-28: VMSA-2018-0012.1</div>
<div> Updated security advisory in conjunction with the release of vCenter</div>
<div> Server 5.5 U3i, 6.0 U3f, 6.5 U2b, 6.7.0b and ESXi 5.5 - 6.7 patches</div>
<div> on 2018-06-28.</div>
<div><br>
</div>
<div>- ------------------------------------------------------------------------</div>
<div><br>
</div>
<div>7. Contact</div>
<div><br>
</div>
<div> E-mail list for product security notifications and announcements:</div>
<div> http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce</div>
<div><br>
</div>
<div> This Security Advisory is posted to the following lists:</div>
<div><br>
</div>
<div> security-announce at lists.vmware.com</div>
<div> bugtraq at securityfocus.com</div>
<div> fulldisclosure at seclists.org</div>
<div><br>
</div>
<div> E-mail: security at vmware.com</div>
<div> PGP key at: https://kb.vmware.com/kb/1055</div>
<div><br>
</div>
<div> VMware Security Advisories</div>
<div> http://www.vmware.com/security/advisories</div>
<div><br>
</div>
<div> VMware Security Response Policy</div>
<div> https://www.vmware.com/support/policies/security_response.html</div>
<div><br>
</div>
<div> VMware Lifecycle Support Phases</div>
<div> https://www.vmware.com/support/policies/lifecycle.html</div>
<div> </div>
<div> VMware Security & Compliance Blog </div>
<div> https://blogs.vmware.com/security</div>
<div><br>
</div>
<div> Twitter</div>
<div> https://twitter.com/VMwareSRC</div>
<div><br>
</div>
<div> Copyright 2018 VMware Inc. All rights reserved.</div>
<div><br>
</div>
<div>-----BEGIN PGP SIGNATURE-----</div>
<div>Version: PGP Desktop 9.8.3 (Build 4028)</div>
<div>Charset: utf-8</div>
<div><br>
</div>
<div>wj8DBQFbNaFeDEcm8Vbi9kMRAn4NAJ42HgDjfXkcTVfDupwE4KPdPVsf7wCcDaLy</div>
<div>aN23XiAmhvFSxcQ5GnJR0ls=</div>
<div>=frKv</div>
<div>-----END PGP SIGNATURE-----</div>
<div><br>
</div>
<br>
<p></p>
</div>
</body>
</html>