On Thu, 14 May 2020 15:53:52 -0400
Tom Horsley <horsley1...@gmail.com> wrote:

> On Thu, 14 May 2020 12:33:59 -0700
> stan via users wrote:
> 
> > These are meant to
> > be silos, but this attack would allow someone on one virtual
> > machine to capture data of another virtual machine running on the
> > same core.  
> 
> Reminds me of the very early days of KVM virtualization where I
> discovered that the debug registers weren't being properly
> context switched and you could set a watch on a memory address in a
> program running in one VM and get programs in other VMs to be
> interrupted as though they hit the watch (they fixed it :-).

Yes, meltdown is much more sophisticated, but the same idea.  When I
first read the description, I was astonished that someone had the
ingenuity to come up with it.
_______________________________________________
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org

Reply via email to