On Thu, 14 May 2020 15:53:52 -0400 Tom Horsley <horsley1953@xxxxxxxxx> wrote: > On Thu, 14 May 2020 12:33:59 -0700 > stan via users wrote: > > > These are meant to > > be silos, but this attack would allow someone on one virtual > > machine to capture data of another virtual machine running on the > > same core. > > Reminds me of the very early days of KVM virtualization where I > discovered that the debug registers weren't being properly > context switched and you could set a watch on a memory address in a > program running in one VM and get programs in other VMs to be > interrupted as though they hit the watch (they fixed it :-). Yes, meltdown is much more sophisticated, but the same idea. When I first read the description, I was astonished that someone had the ingenuity to come up with it. _______________________________________________ users mailing list -- users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/users@xxxxxxxxxxxxxxxxxxxxxxx