[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] RE: Paper: Adventures with a certain Xen vulnerability
Hi Joanna, I have a question about the exploitability of the issue described in this paper http://invisiblethingslab.com/pub/xenfb-adventures-10.pdf (link found in http://lists.xensource.com/archives/html/xen-devel/2008-10/msg00411.html). Would exploit be possible if domU were booted with a dom0-supplied kernel (that is, by specifying the kernel in dom0 config rather than via pygrub), which domU would not be able to modify? That is, could the problem be exploited by only playing with domU modules and rebooting the system without modifying the kernel? And what if the dom0-supplied kernel did not allow domU to load any modules? Asking this as part of a more general discussion taking place here: http://lists.xensource.com/archives/html/xen-users/2008-11/msg00102.html I have yet to learn a lot about kernels and modules so sorry if my questions do not make any sense. Thank you in advance, Vasiliy _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |