Yet another critical Xen VM escape bug with a working exploit

xenbits.xen.org/xsa/advisory-212.html

Yet another critical Xen VM escape bug with a working exploit.

Feeling safe on qubes?

Other urls found in this thread:

qubes-os.org/doc/vm-sudo/
marc.info/?l=openbsd-misc&m=119318909016582
qubes-os.org/news/2017/04/04/qsb-29/
twitter.com/NSFWRedditImage

Why does qubes give all its guests password-less sudo? Nearly all hypervisor escapes require root privileges in the guest to begin with.

Qubes gives away the privilege escalation for free.

This is Joanna's reasoning

qubes-os.org/doc/vm-sudo/

Yes, I'm glad these bugs are being found and fixed. Xen has a relatively small code base, so less places for bugs to hide. And qubes mostly uses PV guests, so it doesn't have to deal with the monstrosity of QEMU emulated devices.

I don't want to remember a password for each of my guests

Switch to Docker / Linux Containers if you want security.

somebody post the theo rant on security through virtualization, i'm too lazy to search for it in my pasta archive


kek'd

Does Vincent Canfield use Xen for his VPS cock boxes?

Got you covered fampai.


marc.info/?l=openbsd-misc&m=119318909016582

btw how is openbsd's new native hypervisor?

Like everything on OBSD, either it was already there since the beginning or it doesn't exist.

It will never be relevant. Wasn't it just enabled a few months ago?

Theo started changing his mind about virtualization around 2012/2013. Work began on the hypervisor around 2015. It's waay to late.

I've always wondered, why is Xen able to run on any CPU but KVM requires a CPU with virtualization technology?

...

Thanks google

Because xen is shit

vmm is not being recommended for security.
That was about x86 virtualization, x86 hardware virtualization support has changed alot since that mail in 2007.

Qubes is still a work in progress, it's important for these bugs to be worked out now while the project is relatively young.

Xen is 15 years old.

Thoughts on Firejail? How secure is it?

It still can't drive or consent, pretty young imo.

Not in my cunt.

What's the goal of projects like oss-fuzz and Project Zero? Google has been finding and fixing serious bugs in competitors like iOS for free.

qubes-os.org/news/2017/04/04/qsb-29/

This is another bug resulting from the overly-complex memory
virtualization required for PV in Xen. As we announced last year [5],
the upcoming Qubes OS 4.0 will no longer use PV. Instead, we will be
switching to HVM-based virtualization

At the same time, we would like to point out that the security of Qubes
OS has so far been affected by less than 10% of publicly disclosed Xen
bugs, as tracked by the recently created Xen Security Advisory (XSA)
Tracker.

Yes.

Paravirtualization. The virtualized OS isn't actually virtualized, it knows it's virtualized and sends requests to the host no the hardware. You can still use KVM with xen if you want, and it should perform better.