<div dir="ltr"><br><div class="gmail_extra"><br><div class="gmail_quote">On Mon, May 1, 2017 at 10:40 PM, Ray Dillinger <span dir="ltr"><<a href="mailto:bear@sonic.net" target="_blank">bear@sonic.net</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><br>[,,,]<br>
<a href="https://semiaccurate.com/2017/05/01/remote-security-exploit-2008-intel-platforms/" rel="noreferrer" target="_blank">https://semiaccurate.com/2017/<wbr>05/01/remote-security-exploit-<wbr>2008-intel-platforms/</a><br>
<br>
                                        Bear<br>
<br>
<br></blockquote><div><br></div><div>Any details of what level of local access is needed for a local exploit? In particular, is this exploitable from inside a VM? That would be really bad news for AWS, Google Cloud, or Azure. </div><div><br></div><div>/ji </div></div></div></div>