VMware Response to Speculative Execution security issues (Spectre and Meltdown)

About 14 hours ago VMware official announce the products mitigation plan in regards to CPU design vulnerabilities (Spectre and Meltdown). Even though mitigation plan has been released. For recent chip design weakness, once the patches are applied, developers have to rewrite code to support the patch. Perhaps VMware programming team cannot address the problem in full scale. But you do not have choices if you are a VM users!

For more details, please see below url for reference:

VMware Response to Speculative Execution security issues, CVE-2017-5753, CVE-2017-5715, CVE-2017-5754 (aka Spectre and Meltdown)


3 thoughts on “VMware Response to Speculative Execution security issues (Spectre and Meltdown)”

  1. Hi there! I just want to give an enormous thumbs up for the good information you’ve got here on this post. I can be coming back to your blog for more soon.

  2. It is really a nice and helpful piece of information. I’m glad that you shared this useful info with us. Please keep us up to date like this. Thank you for sharing.

  3. you’re really a just right webmaster. The web site loading velocity is amazing. It kind of feels that you’re doing any unique trick. Moreover, The contents are masterwork. you’ve done a fantastic activity in this matter!

Comments are closed.