Daniel,

Here is the sample code to trigger Meltdown

https://bugs.chromium.org/p/project-zero/issues/detail?id=1272

Plus KVM exploit.

Implementation of both using the original papers

https://spectreattack.com/


Best regards,

--
 Patrick K.

On 1/9/2018 12:32 PM, Daniel Walsh wrote:
Or SECCOMP for that matter.  From my limited reading, I have not seen what an application needs to access to trigger this vulnerabiltiy.  Is this just using standard SYSCALLS, that we could not block without breaking the applications?

Anyone have thoughts on this?


Dan






Reply via email to