Vulnerability in the VMM hypervisor developed by OpenBSD was not fully fixed

After analyzing the release of the OpenBSD project corrections vulnerabilities in the VMM hypervisor, identified last week, the researcher who discovered the problem
made a conclusionthat the patch proposed to users does not fix the problem. The researcher pointed out that the issue is not due to the contiguous allocation of guest physical addresses (GPA, Guest Physical Address) as well as host physical addresses (HPA). When the memory page structure is traversed, the guest system can still overwrite the contents of the kernel memory regions of the host environment.

The vulnerability was identified by Maxim Willard (Maxime Villard), the author of NetBSD's kernel address space randomization mechanism (KASLR, Kernel Address Space Layout Randomization) and hypervisor NVMM.

Source: opennet.ru

Add a comment