[Users] rowhammer exploit
lst_hoe02 at kwsoft.de
lst_hoe02 at kwsoft.de
Tue Mar 10 06:35:41 PDT 2015
Zitat von Benjamin Henrion <zoobab at gmail.com>:
> Hi,
>
> Could this be used to gain HN root access from a container:
>
> http://googleprojectzero.blogspot.be/2015/03/exploiting-dram-rowhammer-bug-to-gain.html?m=1
>
> best,
As i understand this is a hardware defect, so yes it would be
exploitable within any OS which does not explicit prevent the usage
pattern of RAM.
Regards
Andreas
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 5931 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.openvz.org/pipermail/users/attachments/20150310/15941fdc/attachment.p7s>
More information about the Users
mailing list