The purpose of this article is to respond to the security issues related to speculative execution described by
CVE-2018-3639 (Speculative Store Bypass) and
CVE-2018-3640 (Rogue System Register Read) in modern-day processors as they apply to VMware. Because there will be multiple documents necessary to respond to these issues, consider this document as the centralized source of truth for these issues.
The
Update History section of this document will be revised when there is a significant change to any of the related documentation. Click
Subscribe to Article in the Actions box to be alerted when new information is added to this document and sign up at our
Security-Announce mailing list to receive new and updated VMware Security Advisories.
Background
To assist in understanding Speculative Execution vulnerabilities, VMware previously defined the following categories in
KB52245 - review this knowledge base article for an explanation of these categories:
- Hypervisor-Specific Mitigation
- Hypervisor-Assisted Guest Mitigation
- Operating System-Specific Mitigations
With the disclosure of
CVE-2018-3640 a 4th category has been defined:
Microcode Mitigations are applied to a system’s processor(s) by a microcode update from the hardware vendor. These mitigations may not require hypervisor or guest operating system updates to be effective. Nonetheless, ESXi plans to include microcode updates that contain such mitigations when they become available, as a convenience to our customers.
Mitigation of CVE-2018-3639 and CVE-2018-3640Mitigation of
CVE-2018-3639 (Speculative Store Bypass) requires both
Hypervisor-Assisted Guest Mitigations and
Operating System-Specific Mitigations.
Mitigation of
CVE-2018-3640 (Rogue System Register Read) requires
Microcode Mitigations.
Note:
Based on current evaluations, we do not believe that
CVE-2018-3639 or
CVE-2018-3640 could allow for VM to VM or Hypervisor to VM Information disclosure. Thus,
Hypervisor-Specific Mitigations are not required.