![]() Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. This patch is not applicable if a host has already applied the ESXi550-201801401-BG patch. VMware Fusion is the easiest, fastest, and most reliable way to run Windows and other x86 based operating systems on a Mac without rebooting. The Common Vulnerabilities and Exposures project () has assigned the identifiers CVE-2017-5753 (Bounds Check bypass) and CVE-2017-5715 (Branch Target Injection) to these issues.Ĭolumn 5 of the following table lists the action required to remediate the observed vulnerability in each release, if a solution is available. Result of exploitation may allow for information disclosure from one Virtual Machine to another Virtual Machine that is running on the same host. (Speculative execution is an automatic and inherent CPU performance optimization used in all modern processors.) ESXi, Workstation and Fusion are vulnerable to Bounds Check Bypass and Branch Target Injection issues resulting from this vulnerability. VMware Workstation Pro / Player (Workstation)īounds-Check bypass and Branch Target Injection issuesĬPU data cache timing can be abused to efficiently leak information out of mis-speculated CPU execution, leading to (at worst) arbitrary virtual memory read vulnerabilities across local security boundaries in various contexts.
0 Comments
Leave a Reply. |