New security advisory released by VMware
VMware has released the following new security advisory:
VMSA-2018-0002 – VMware ESXi, Workstation and Fusion updates address side-channel analysis due to speculative execution.
This advisory documents remediation for known variants of the Bounds-Check Bypass (CVE-2017-5753) and Branch Target Injection (CVE-2017-5715) issues due to speculative execution disclosed today by Google Project Zero. These issues may result in information disclosure from one Virtual Machine to another Virtual Machine that is running on the same host.
A third issue due to speculative execution, Rogue Data Cache Load (CVE-2017-5754), was disclosed along the other two issues. It does not affect ESXi, Workstation, and Fusion because ESXi does not run untrusted user mode code, and Workstation and Fusion rely on the protection that the underlying operating system provides.
The remediation as documented in VMSA-2018-0002, has been present in VMware Cloud on AWS since early December 2017.
Source:- VMware blog.
Latest posts
-
The Modern Private Cloud—What is VMware Cloud Foundation 9?
For over two decades, VMware transformed the data center by abstracting hardware into software. But as we entered the era of multi-cloud and AI, the challenge shifted from “how do I…
·
-
VCF 9 vs VVF: Which VMware Solution is Right for You?
Since the Broadcom acquisition, the VMware portfolio has undergone its most significant transformation in decades. For the “Virtual Maestro” community, the shift from hundreds of individual point products to two…
-
What is Virtualization-Based Security for Windows Guest Operating Systems
Virtualization-Based Security (VBS) for Windows guest operating systems is a security feature that uses hardware virtualization to create and isolate a secure region of memory from the normal operating system.…
·

Leave a comment