Subscribe via feed.

Xen 64bit PV Guest Breakout Via Pagetable Use-After-Type-Change

Posted by deepcore on May 9, 2017 – 9:54 am

This is a bug in Xen that permits an attacker with control over the kernel of a 64bit X86 PV guest to write arbitrary entries into a live top-level pagetable.


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.