Re: OpenSSL Heartbeat exploit agains KVM guest systems

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On Tue, Apr 08, 2014 at 10:11:32AM -0400, James B. Byrne wrote:
> Is it possible to use this exploit against a kvm guest to read memory used by
> the host?  In other words: if an exploitable service, say httpd with mod_ssl,
> is running in guest system 'vm1' hosted on system 'virthost' then what
> implications does that have with respect to guests vm2 and vm3 and to virthost
> itself?

As I understand it, no. In fact, the memory read doesn't even cross normal
*memory protections within* the VM -- this is not a kernel exploit.

-- 
Matthew Miller           mattdm@xxxxxxxxxx          <http://mattdm.org/>
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos




[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux