by Tim Anderson on (#5JJCQ)
Now patched: 'A function that can be called with attacker-controlled data (which it shouldn't) and dereference twice a pointer (boom)' Security researchers have posted proof of concept code that exploits a recently patched vulnerability in Microsoft's Hyper-V hypervisor. The bug enables code in the guest to crash the host, and in some circumstances compromise the host's security.…