Re: How can CVE-2018-1087(POP SS) vulnerability make an escalate privilege to the guest kernel

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 10/05/2018 08:01, Li Qiang wrote:
> Hello Andy and Paolo,
> 
> I noticed you say that the pop ss may cause an escalate privilege for
> the guest user.
> I know the pop ss can't make code execution in linux. 
> So I don't  understand how the guest user privilege escalate can be
> achieved.

By skipping any number of bytes, from 1 to 15, at the beginning of the
#BP exception handler.

Paolo

> Could you please give me some more hint for this.
> Thanks,
> Li Qiang
> 
> 




[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux