As you may have already heard, an industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions.This issue is well described by CVE-2018-3639 announce available at https://access.redhat.com/security/cve/cve-2018-3639 .oVirt team has released right now an update of ovirt-engine to version 4.2.3.7 which add support for SSBD CPUs in order to mitigate the security issue.If you are running oVirt on Red Hat Enterprise Linux, please apply updates described in https://access.redhat.com/security/cve/cve-2018-3639 .If you are running oVirt on CentOS Linux please apply updated described by:An update for qemu-kvm-ev has been also tagged for release and announced withbut due to some issues in CentOS release process for Virt SIG content, it is not yet available on mirrors.We are working with CentOS community to get the packages signed and published as soon as possible.In the meanwhile you can still get the update package by enabling the test repository https://buildlogs.centos.org/centos/7/virt/x86_ on your systems or manually installing the package from the repository.64/kvm-common/ If you're running oVirt on a different Linux distribution, please check with your vendor for available updates.Please note that to fully mitigate this vulnerability, system administrators must apply both hardware “microcode” updates and software patches that enable new functionality.At this time, microprocessor microcode will be delivered by the individual manufacturers.