Announcement: VMware Response to Speculative Execution security issues CVE-2017-5753, CVE-2017-5715, CVE-2017-5754 (aka Spectre and Meltdown)
On January 3, 2018, it became public that CPU data cache timing can be abused by software to efficiently leak information out of mis-speculated CPU execution, leading to (at worst) arbitrary virtual memory read vulnerabilities across local security boundaries in various contexts.
Three variants have been recently discovered by Google Project Zero and other security researchers; these can affect many modern processors, including certain processors by Intel, AMD and ARM.
For more information see KB52245
Latest posts
-
The Modern Private Cloud—What is VMware Cloud Foundation 9?
For over two decades, VMware transformed the data center by abstracting hardware into software. But as we entered the era of multi-cloud and AI, the challenge shifted from “how do I…
·
-
VCF 9 vs VVF: Which VMware Solution is Right for You?
Since the Broadcom acquisition, the VMware portfolio has undergone its most significant transformation in decades. For the “Virtual Maestro” community, the shift from hundreds of individual point products to two…
-
What is Virtualization-Based Security for Windows Guest Operating Systems
Virtualization-Based Security (VBS) for Windows guest operating systems is a security feature that uses hardware virtualization to create and isolate a secure region of memory from the normal operating system.…
·

Leave a comment