Port-xen archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: Xen PV memory virtualization code security issue?
On Oct 30, 12:27pm, Hauke Fath wrote:
}
} has this
}
} <https://raw.githubusercontent.com/QubesOS/qubes-secpack/master/QSBs/qsb-022-2015.txt>
} (via fefe.de)
}
} been seen already?
Yes, it has. Our xenkernel packages have all been updated
with the fix, plus several others.
} Relevance for NetBSD/xen?
This is a bug in the Xen hypervisor itself. It allows a
malicious PV guest to get access to physical memory. At that point,
the host and all guests have been fully comprimised. It is not
directly related to NetBSD/xen except that if NetBSD is running on
a Xen system that has been comprimised, it will be comprimised as
well.
}-- End of excerpt from Hauke Fath
Home |
Main Index |
Thread Index |
Old Index