[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Is Xen affected by this x86 hardware security hole?
> Thanks for the resonses. > > For those interested in the gory details of a proof-of-concept exploit, > it's all laid out in the 16-page pdf by Loic Duflot: > > http://www.ssi.gouv.fr/fr/sciences/fichiers/lti/cansecwest2006-duflot-paper >.pdf Ah, interesting. It turns out this exploit is something new, in that it's not something I'd heard of before. But it looks mostly interesting to OpenBSD. Why? Because OpenBSD has more sane controls on the X Server than Linux, and so the fact that it can elevate privileges is worrysome. Since on Linux it (often) runs with superuser privileges anyhow, this attack isn't the main problem... Their exploit *does* show that mmap of the video ram, combined with the ability to access IO port 0xB2 is enough for a root exploit... I don't know if fbdev is restrictive enough to prevent this - OBSD have obviously tried to minimise X11's privileges and still found it circumventable. Nevertheless, Xen offers confinement. Also, as Keir pointed out, there are stricter restrictions on what even dom0 can do (and these can be made even more strict). Cheers, Mark -- Dave: Just a question. What use is a unicyle with no seat? And no pedals! Mark: To answer a question with a question: What use is a skateboard? Dave: Skateboards have wheels. Mark: My wheel has a wheel! _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |