Pandavirtualization: Exploiting the Xen hypervisor (Project Zero)
To demonstrate the impact of the issue, I created an exploit that, when executed in one 64-bit PV guest with root privileges, will execute a shell command as root in all other 64-bit PV guests (including dom0) on the same physical machine."
Posted Apr 7, 2017 16:54 UTC (Fri)
by NightMonkey (subscriber, #23051)
[Link] (5 responses)
Posted Apr 7, 2017 17:41 UTC (Fri)
by dw (subscriber, #12017)
[Link] (4 responses)
Posted Apr 7, 2017 20:53 UTC (Fri)
by NightMonkey (subscriber, #23051)
[Link] (3 responses)
Posted Apr 7, 2017 21:10 UTC (Fri)
by excors (subscriber, #95769)
[Link]
Most cloud providers presumably have similar policies, and are similarly notified before the public disclosure, so they should have all patched it already and forced reboots where necessary.
Posted Apr 10, 2017 6:56 UTC (Mon)
by buchanmilne (guest, #42315)
[Link] (1 responses)
Posted Apr 13, 2017 8:49 UTC (Thu)
by dunlapg (guest, #57764)
[Link]
Posted Apr 7, 2017 18:54 UTC (Fri)
by SEJeff (guest, #51588)
[Link]
Posted Apr 10, 2017 21:52 UTC (Mon)
by nix (subscriber, #2304)
[Link]
Some way down Rusty's API sin list, I think.
Pandavirtualization: Exploiting the Xen hypervisor (Project Zero)
Pandavirtualization: Exploiting the Xen hypervisor (Project Zero)
Pandavirtualization: Exploiting the Xen hypervisor (Project Zero)
Pandavirtualization: Exploiting the Xen hypervisor (Project Zero)
Pandavirtualization: Exploiting the Xen hypervisor (Project Zero)
AWS has had a proprietary hot-patching capability for years, and ever since they introduced it, I haven't seen a single press release that didn't say, "AWS is not affected." This means one of two things:
Pandavirtualization: Exploiting the Xen hypervisor (Project Zero)
I tend to favor the second hypothesis.
Pandavirtualization: Exploiting the Xen hypervisor (Project Zero)
Pandavirtualization: Exploiting the Xen hypervisor (Project Zero)