{"id":7245,"date":"2017-04-05T10:30:02","date_gmt":"2017-04-05T18:30:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/04\/05\/news-1036\/"},"modified":"2017-04-05T10:30:02","modified_gmt":"2017-04-05T18:30:02","slug":"news-1036","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/04\/05\/news-1036\/","title":{"rendered":"Critical Xen hypervisor flaw endangers virtualized environments"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt0.staticworld.net\/images\/article\/2016\/02\/xen_project_mascot_security_1-100644997-primary.idge.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lucian Constantin| Date: Wed, 05 Apr 2017 10:59:00 -0700<\/strong><\/p>\n<p>A critical vulnerability in the widely used Xen hypervisor allows attackers to break out of a guest operating system running inside a virtual machine and access the host system&#8217;s entire memory.<\/p>\n<p>This is a serious violation of the security barrier enforced by the hypervisor and poses a particular threat to multi-tenant data centers where the customers&#8217; virtualized servers share the same underlying hardware.<\/p>\n<p>The open-source Xen hypervisor is used by cloud computing providers and virtual private server hosting companies, as well as by security-oriented operating systems like Qubes OS.<\/p>\n<p><a href=\"https:\/\/xenbits.xen.org\/xsa\/advisory-212.html\" target=\"_blank\">The new vulnerability<\/a> affects Xen 4.8.x, 4.7.x, 4.6.x, 4.5.x, and 4.4.x and has existed in the Xen code base for over four years. It was unintentionally introduced in December 2012 as part of a fix for a different issue.<\/p>\n<p>The Xen project released a patch Tuesday that can be applied manually to vulnerable deployments. The good news is that the vulnerability can only be exploited from 64-bit paravirtualized guest operating systems.<\/p>\n<p>Xen supports two types of virtual machines: Hardware Virtual Machines (HVMs), which use hardware-assisted virtualization, and paravirtualized (PV) VMs that use software-based virtualization. Based on whether they use PV VMs, Xen users might be affected or not.<\/p>\n<p>For example, Amazon Web Services said in <a href=\"https:\/\/aws.amazon.com\/security\/security-bulletins\/AWS-2017-004\/\" target=\"_blank\">an advisory<\/a> that its customers&#8217; data and instances were not affected by this vulnerability and no customer action is required. Meanwhile, virtual private server provider Linode <a href=\"https:\/\/status.linode.com\/incidents\/1ph54f4nnmd6\" target=\"_blank\">had to reboot<\/a> some of its legacy Xen servers in order to apply the fix.<\/p>\n<p>Qubes OS, an operating system that uses Xen to isolate applications inside virtual machines, also put out <a href=\"https:\/\/github.com\/QubesOS\/qubes-secpack\/blob\/master\/QSBs\/qsb-029-2017.txt\" target=\"_blank\">an advisory<\/a> warning that an attacker who exploits another vulnerability, for example inside a browser, can exploit this Xen issue to compromise the whole Qubes system.<\/p>\n<p>The Qubes developers have released a patched Xen package for Qubes 3.1 and 3.2 and reiterated their intention to stop using paravirtualization altogether in the upcoming Qubes 4.0.<\/p>\n<p>Vulnerabilities that allow breaking the isolation layer of virtual machines can be very valuable for attackers. The recent Pwn2Own hacking contest offered <a href=\"http:\/\/www.computerworld.com\/article\/3182877\/security\/pwn2own-ends-with-two-virtual-machine-escapes.html\" target=\"_blank\">a $100,000 reward<\/a>\u00a0for virtual machine escapes in VMware Workstation or Microsoft Hyper-V. Exploit acquisition firm Zerodium offers up to $50,000 for such an exploit.<\/p>\n<p><a href=\"http:\/\/www.computerworld.com\/article\/3187945\/security\/critical-xen-hypervisor-flaw-endangers-virtualized-environments.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt0.staticworld.net\/images\/article\/2016\/02\/xen_project_mascot_security_1-100644997-primary.idge.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lucian Constantin| Date: Wed, 05 Apr 2017 10:59:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>A critical vulnerability in the widely used Xen hypervisor allows attackers to break out of a guest operating system running inside a virtual machine and access the host system&#8217;s entire memory.<\/p>\n<p>This is a serious violation of the security barrier enforced by the hypervisor and poses a particular threat to multi-tenant data centers where the customers&#8217; virtualized servers share the same underlying hardware.<\/p>\n<p>The open-source Xen hypervisor is used by cloud computing providers and virtual private server hosting companies, as well as by security-oriented operating systems like Qubes OS.<\/p>\n<aside class=\"fakesidebar\"> <strong>[ Further reading: <a href=\"http:\/\/www.computerworld.com\/article\/3186418\/security\/vmware-patches-critical-virtual-machine-escape-flaws.html#tk.rss_all\" target=\"_blank\">VMware patches critical virtual machine escape flaws<\/a> ]<\/strong> <\/aside>\n<p><a href=\"https:\/\/xenbits.xen.org\/xsa\/advisory-212.html\" target=\"_blank\">The new vulnerability<\/a> affects Xen 4.8.x, 4.7.x, 4.6.x, 4.5.x, and 4.4.x and has existed in the Xen code base for over four years. It was unintentionally introduced in December 2012 as part of a fix for a different issue.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3187945\/security\/critical-xen-hypervisor-flaw-endangers-virtualized-environments.html#jump\">To read this article in full or to leave a comment, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[714,11758],"class_list":["post-7245","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-security","tag-virtualization"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7245"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7245\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}