Meltdown strikes back: the L1 terminal fault vulnerability
Meltdown strikes back: the L1 terminal fault vulnerability
Posted Aug 16, 2018 3:08 UTC (Thu) by Rearden (subscriber, #35172)In reply to: Meltdown strikes back: the L1 terminal fault vulnerability by danpb
Parent article: Meltdown strikes back: the L1 terminal fault vulnerability
Posted Aug 16, 2018 18:42 UTC (Thu)
by jcm (subscriber, #18262)
[Link] (2 responses)
Posted Aug 17, 2018 0:01 UTC (Fri)
by Rearden (subscriber, #35172)
[Link]
Of course some futher privilege escalation vulnerability could expose the VM host OS to this, but a further privilege escalation vulnerability would likely also expose all sorts of other things as well, this vulnerability being just one of many.
Big picture security comes down to risk mitigation through a layered approach, depending on the resources available and the risk associated with a particular breach. Some future, possible "privilege escalation" vulnerability must be planned for outside of the rememdy for this specific vulnerability. What I mean is, if your workflow and risk for a system that you own both the VM and Host OS is high enough that a compromise of one could impact imporant data, you probably need to be taking the steps associated with "untrusted" guest VMs anyway.
Posted Oct 24, 2018 6:48 UTC (Wed)
by alejluther (subscriber, #5404)
[Link]
Meltdown strikes back: the L1 terminal fault vulnerability
Meltdown strikes back: the L1 terminal fault vulnerability
Meltdown strikes back: the L1 terminal fault vulnerability