-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.2264
  Important: rhvm-setup-plugins security, bug fix, and enhancement update
                               6 August 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           rhvm-setup-plugins security
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Access Privileged Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-3639  

Reference:         ASB-2018.0121
                   ESB-2018.2207
                   ESB-2018.2184
                   ESB-2018.1549
                   ESB-2018.1548.6
                   ESB-2018.1545

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2018:2328

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: rhvm-setup-plugins security, bug fix, and enhancement update
Advisory ID:       RHSA-2018:2328-01
Product:           Red Hat Virtualization
Advisory URL:      https://access.redhat.com/errata/RHSA-2018:2328
Issue date:        2018-07-31
CVE Names:         CVE-2018-3639 
=====================================================================

1. Summary:

An update for rhvm-setup-plugins is now available for Red Hat
Virtualization Engine 4.2.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

RHV-M 4.2 - noarch

3. Description:

The rhvm-setup-plugins package adds functionality exclusive only to Red Hat
Virtualization Manager, and is not available for the upstream ovirt-engine.
It includes the configuration of the Red Hat Support plugin, copying
downstream-only artifacts to the ISO domain, and links to the knowledgebase
and other support material.

The following packages have been upgraded to a later upstream version:
rhvm-setup-plugins (4.2.10). (BZ#1596152)

Security Fix(es):

* An industry-wide issue was found in the way many modern microprocessor
designs have implemented speculative execution of Load & Store instructions
(a commonly used performance optimization). It relies on the presence of a
precisely-defined instruction sequence in the privileged code as well as
the fact that memory read from address to which a recent memory write has
occurred may see an older value and subsequently cause an update into the
microprocessor's data cache even for speculatively executed instructions
that never actually commit (retire). As a result, an unprivileged attacker
could use this flaw to read privileged memory by conducting targeted cache
side-channel attacks. (CVE-2018-3639, x86 AMD)

Red Hat would like to thank Ken Johnson (Microsoft Security Response
Center) and Jann Horn (Google Project Zero) for reporting this issue.

Bug Fix(es):

* This update adds support for IBM POWER9 hypervisors with RHEL-ALT and
POWER9 guests. It also adds support for POWER8 guests on a POWER9
hypervisor and live migration of POWER8 guests between POWER8 and POWER9
hypervisors. (BZ#1592320)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1566890 - CVE-2018-3639 hw: cpu: speculative store bypass
1592320 - [downstream clone - 4.2.5] add POWER 9 to the 4.2 cluster level

6. Package List:

RHV-M 4.2:

Source:
rhvm-setup-plugins-4.2.10-1.el7ev.src.rpm

noarch:
rhvm-setup-plugins-4.2.10-1.el7ev.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-3639
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=tMcm
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=mMde
-----END PGP SIGNATURE-----