User: Password:
|
|
Subscribe / Log in / New account

LinuxCon: Secure virtualization with sVirt

LinuxCon: Secure virtualization with sVirt

Posted Sep 24, 2009 8:42 UTC (Thu) by djm (subscriber, #11651)
Parent article: LinuxCon: Secure virtualization with sVirt

Let me get this straight: an attacker has gained access to a VM, escalated
privilege, escaped the (probably-hardware assisted) VM containment and they
think that more OS-level controls will prevent the same thing happening in
the host OS? IMO it is more likely that they escaped the VM by exploiting
bugs in the host OS kernel to begin with so sVirt couldn't help anyway...


(Log in to post comments)

LinuxCon: Secure virtualization with sVirt

Posted Sep 24, 2009 9:41 UTC (Thu) by danpb (subscriber, #4831) [Link]

If you look at the Xen vulnerabilities there has been a good split between flaws in the hypervisor/host kernel, and flaws in the QEMU device model. sVirt doesn't claim to protect the kernel, but it does offer valuable protection against QEMU device model flaws.


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds