virtualisation and amd and intel speculative execution security bugs

virtualisation and amd and intel speculative execution security bugs

if you want to use amd and intel microcode updates that mitigate against “branch target injection” (aka meltdown and spectre) defects in their CPUs you may want to patch your host and enable hypervisor-assisted guest mitigation so virtual machine guests also function

https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html

  • Hypervisor-Specific Mitigation
  • Hypervisor-Assisted Guest Mitigation
  • Operating System-Specific Mitigations

See also

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s