[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-users] Re: malicious paravirtualized guests: security and isolation


  • To: xen-users@xxxxxxxxxxxxxxxxxxx
  • From: "Vasiliy Baranov" <vasiliy.baranov@xxxxxxxxx>
  • Date: Fri, 14 Nov 2008 21:34:24 +0300
  • Delivery-date: Fri, 14 Nov 2008 10:35:10 -0800
  • Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:to:subject:in-reply-to:mime-version :content-type:references; b=EN05naY100OYrITxB0SnNCTNnT9vcLZwA43q96lwgBv9vpwu/qDulu/Hni69ZXNQi/ bp4Fde23s9v5WUYXX70MeZccWOry2X2HvkaKuu5PP7oeap5Q+uiO5nc8XgoxzOM9TWw5 WidCJFArFgaoNzB7kSMDRsJ8cBCN0/tA+46Q8=
  • List-id: Xen user discussion <xen-users.lists.xensource.com>


On Tue, Nov 11, 2008 at 8:03 PM, Vasiliy Baranov <vasiliy.baranov@xxxxxxxxx> wrote:

On Tue, Nov 11, 2008 at 5:52 PM, Todd Deshane <deshantm@xxxxxxxxx> wrote:
 
White hat hackers have been able to find various tricky ways to break out of
the isolation that xen provides, but I haven't heard of any exploits that have
been taken advantage of in practice.
http://theinvisiblethings.blogspot.com/2008/07/0wning-xen-in-vegas.html
http://xen.markmail.org/search/?q=Rutkowska

Following up on this, these two links help a lot.

Thanks again,
Vasiliy

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.