Groups
Groups
Sign in
Groups
Groups
qubes-users
Conversations
About
Send feedback
Help
Pandavirtualization: Exploiting the Xen hypervisor
47 views
Skip to first unread message
qubenix
unread,
Apr 7, 2017, 6:33:13 PM
4/7/17
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to qubes...@googlegroups.com
Wondering if the list has seen this yet:
https://googleprojectzero.blogspot.com/2017/04/pandavirtualization-exploiting-xen.html
PoC on Qubes 3.2.
--
qubenix
GPG: B536812904D455B491DCDCDD04BE1E61A3C2E500
Unman
unread,
Apr 7, 2017, 6:42:30 PM
4/7/17
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to qubenix, qubes...@googlegroups.com
On Fri, Apr 07, 2017 at 10:33:00PM +0000, qubenix wrote:
> Wondering if the list has seen this yet:
>
https://googleprojectzero.blogspot.com/2017/04/pandavirtualization-exploiting-xen.html
>
> PoC on Qubes 3.2.
>
It was announced on the list on the 4th -
QSB #29: Critical Xen bug in PV memory virtualization code (XSA-212)
Full details and analysis are in the Security Bulletin.
Reply all
Reply to author
Forward
0 new messages