One could assert that the days of time sharing systems are largely over, at least on production systems that people care about.
And I think it's fair to say that it has been good practice for quite some time to not allow random binaries to run on systems you care about. I have no idea whether hypervisors (like xen or esxi) are vulnerable. But the same guidelines can be applied to VMs running on hypervisors. I wonder how exploitable this problem really is? Cheers, happy new year John On Wed, 2018/01/03 10:56:30PM -0500, Dhaval Giani via talk <[email protected]> wrote: | https://googleprojectzero.blogspot.ca/2018/01/reading-privileged-memory-with-side.html | gives the gory details | | At this point, I cannot stress on how important it is to update your | systems as soon as your distribution ships them. I am hoping this | remains to be a once in a lifetime event. | | Dhaval | --- | Talk Mailing List | [email protected] | https://gtalug.org/mailman/listinfo/talk --- Talk Mailing List [email protected] https://gtalug.org/mailman/listinfo/talk
