One could assert that the days of time sharing systems are largely over,
at least on production systems that people care about.

And I think it's fair to say that it has been good practice for quite
some time to not allow random binaries to run on systems you care about.

I have no idea whether hypervisors (like xen or esxi) are vulnerable.
But the same guidelines can be applied to VMs running on hypervisors.

I wonder how exploitable this problem really is?

Cheers, happy new year

John


On Wed, 2018/01/03 10:56:30PM -0500, Dhaval Giani via talk <[email protected]> 
wrote:
| 
https://googleprojectzero.blogspot.ca/2018/01/reading-privileged-memory-with-side.html
| gives the gory details
| 
| At this point, I cannot stress on how important it is to update your
| systems as soon as your distribution ships them. I am hoping this
| remains to be a once in a lifetime event.
| 
| Dhaval
| ---
| Talk Mailing List
| [email protected]
| https://gtalug.org/mailman/listinfo/talk
---
Talk Mailing List
[email protected]
https://gtalug.org/mailman/listinfo/talk

Reply via email to