In the HVM case an attacker can't generate hypervisor addresses because the hypervisor runs in a separate address space, so HVM isn't vulnerable to the most easily exploitable of the disclosed issues.
Interesting point, we did have a pretty good discussion about operations and VMs/containers in the guest lecture by Aaron Davidson from Databricks on 11/13 (slides/notes on the website).