Xen 64bit PV Guest Breakout Via Pagetable Use-After-Type-Change

This is a bug in Xen that permits an attacker with control over the kernel of a 64bit X86 PV guest to write arbitrary entries into a live top-level pagetable.


MD5 | 5a144654a1b03c1ef898b305457a091d


Related Posts

Comments