Such VMs are therefore known as “Hackintoshes”.
I thought that applied to non Apple hardware running Mac OS back in the nineties.
Kids today eh?
VMware has found two flaws un its products, both of which impact users running Mac OS. One means that Mac OS X guest VMs running VMware Tools can “allow a privileged local user on a system where System Integrity Protection (SIP) is enabled, to obtain kernel memory addresses to bypass the kASLR protection mechanism.” The good …
"Mac OS is notoriously hard to virtualise, and creating a Mac OS VM that will run on non-Apple hardware requires all manner of tweaking"
No it isn't. You can do it effortlessly in VMware Fusion, and then you can even take those VMDKs/VMXs and take them to VMware Workstation on Windows, or even ESXi, and often they work fine with only very minor tweaks to the SMBIOS lines in the VMX file.
"allow a privileged local user on a system where System Integrity Protection (SIP) is enabled"
"The good news is that SIP is default enabled in recent versions of Mac OS" - so it's good the default is to enable the vulnerability? Shirley not!
Meh!