[Users] rowhammer exploit

lst_hoe02 at kwsoft.de lst_hoe02 at kwsoft.de
Tue Mar 10 06:35:41 PDT 2015


Zitat von Benjamin Henrion <zoobab at gmail.com>:

> Hi,
>
> Could this be used to gain HN root access from a container:
>
> http://googleprojectzero.blogspot.be/2015/03/exploiting-dram-rowhammer-bug-to-gain.html?m=1
>
> best,

As i understand this is a hardware defect, so yes it would be  
exploitable within any OS which does not explicit prevent the usage  
pattern of RAM.

Regards

Andreas

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 5931 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.openvz.org/pipermail/users/attachments/20150310/15941fdc/attachment.p7s>


More information about the Users mailing list