
One could assert that the days of time sharing systems are largely over, at least on production systems that people care about. And I think it's fair to say that it has been good practice for quite some time to not allow random binaries to run on systems you care about. I have no idea whether hypervisors (like xen or esxi) are vulnerable. But the same guidelines can be applied to VMs running on hypervisors. I wonder how exploitable this problem really is? Cheers, happy new year John On Wed, 2018/01/03 10:56:30PM -0500, Dhaval Giani via talk <talk@gtalug.org> wrote: | https://googleprojectzero.blogspot.ca/2018/01/reading-privileged-memory-with... | gives the gory details | | At this point, I cannot stress on how important it is to update your | systems as soon as your distribution ships them. I am hoping this | remains to be a once in a lifetime event. | | Dhaval | --- | Talk Mailing List | talk@gtalug.org | https://gtalug.org/mailman/listinfo/talk