Two vmm(4) related security fixes went in today by Pratik Vyas/pd@, one of which I helped work on.
"vmm(4): check page boundaries for pvclock struct Check if pvclock struct crosses page boundaries as that could potentially corrupt host memory. Discussed with guenther@ and Mike Larkin Reported by Maxime Villard. ok mortimer@
"vmm(4): tighten rdmsr on svm For MSRs not emulated or passed through explicitly, inject #GP. With help from brynet@ Reported by Maxime Villard. ok brynet@"
Now and then I look at incoming links to my web site.
More than one company links to me from a page called some variant of "new hire checklist."
Career tip: if you job requires you to read #savagedbysystemd, you need a new job.
Arguments about the best way to indent code evaporate when your org forbids indenting code. #sysadmin
Errata patches for vmm have been released for OpenBSD 6.6.
A missing range check in the vmm pvclock allows a guest to write
to host memory.
Binary updates for the amd64 platform are available via the syspatch
utility. Source code patches can be found on the errata page:
As these affect the kernel, a reboot will be needed after patching.
If you're gonna ouch, ouch bigly.
making basically-undocumented arm devices run on an actually updated kernel is literally my job
@sir how is your domain registrar product coming along? I am in need of an interface that doesn’t give me headaches.
if you know anything about software "not terrible" is an absolutely glowing review
Music connoisseur and technophobe.
Server run by the main developers of the project It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!