

Please see VMware knowledge base article 52085 for more details. Update the host firmware (or CPU microcode, if host firmware cannot be updated).Update your guest operating system with fixes for CVE-2018-5715 (consult the operating system vendor for these updates).For best performance, Hardware Version 11 or higher is recommended. Ensure that your VM is using Hardware Version 9 or higher.This hardware is used by some guest operating systems to mitigate CVE-2018-5715 (also called by the name "Spectre").įor a guest operating system to use hardware support for branch target injection mitigation, the following steps must be taken: This update of VMware Fusion exposes hardware support for branch target injection mitigation to VMware guests. To view the release notes for prior releases of VMware Fusion 8, click the following links: Prior Releasesįeatures and Known Issues from prior releases of VMware Fusion are described in the release notes for each release. Update the host firmware (or CPU microcode, if host firmware. Update your guest operating system with fixes for CVE-2018-5715 (consult the operating system vendor for these updates). VMware Fusion is the easiest, fastest, and most reliable way to run Windows and other x86 based operating systems on a Mac without rebooting.įor more information, go to the VMware Fusion Docs website. Ensure that your VM is using Hardware Version 9 or higher. Check for additions and updates to these release notes.
