Port-xen archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: Xen PV memory virtualization code security issue?



On Oct 30, 12:27pm, Hauke Fath wrote:
} 
} has this 
} 
} <https://raw.githubusercontent.com/QubesOS/qubes-secpack/master/QSBs/qsb-022-2015.txt> 
} (via fefe.de)
} 
} been seen already? 
 Yes, it has. Our xenkernel packages have all been updated
with the fix, plus several others.
} Relevance for NetBSD/xen?
 This is a bug in the Xen hypervisor itself. It allows a
malicious PV guest to get access to physical memory. At that point,
the host and all guests have been fully comprimised. It is not
directly related to NetBSD/xen except that if NetBSD is running on
a Xen system that has been comprimised, it will be comprimised as
well.
}-- End of excerpt from Hauke Fath


Home | Main Index | Thread Index | Old Index

AltStyle によって変換されたページ (->オリジナル) /