Xen Vulnerability Allows Hackers To Escape Qubes OS VM And Own the Host (itnews.com.au) 73
Slashdot reader Noryungi writes: Qubes OS certainly has an intriguing approach to security, but a newly discovered Xen vulnerability allows a hacker to escape a VM and own the host. If you are running Qubes, make sure you update the dom0 operating system to the latest version.
"A malicious, paravirtualized guest administrator can raise their system privileges to that of the host on unpatched installations," according to an article in IT News, which quotes Xen as saying "The bits considered safe were too broad, and not actually safe." IT News is also reporting that Qubes will move to full hardware memory virtualization in its next 4.0 release. Xen's hypervisor "is used by cloud giants Amazon Web Services, IBM and Rackspace," according to the article, which quotes a Qubes security researcher who asks the age-old question. "Has Xen been written by competent developers? How many more bugs of this caliber are we going to witness in the future?"
"A malicious, paravirtualized guest administrator can raise their system privileges to that of the host on unpatched installations," according to an article in IT News, which quotes Xen as saying "The bits considered safe were too broad, and not actually safe." IT News is also reporting that Qubes will move to full hardware memory virtualization in its next 4.0 release. Xen's hypervisor "is used by cloud giants Amazon Web Services, IBM and Rackspace," according to the article, which quotes a Qubes security researcher who asks the age-old question. "Has Xen been written by competent developers? How many more bugs of this caliber are we going to witness in the future?"
well, shitlord... (Score:4, Insightful)
which quotes a Qubes security researcher who asks the age-old question. "Has Xen been written by competent developers? How many more bugs of this caliber are we going to witness in the future?"
Well, "Qubes security researcher", which platform did you choose for your project, and did you audit it fully before making your releases? No?
Which raises the age-old question: Has Qubes been written by competent developers?
Re: (Score:2)
Good thing you posted this anonymously, so people don't know who the fucktard is.
Re:well, shitlord... (Score:5, Informative)
What's really rich about that question is that if you read their advisory, the Qubes developers couldn't figure out how to exploit the vulnerability when handed a patch that changes the problematic behavior. If not spotting the issue without having it handed to them makes the Xen developers incompetent, what does that say about the Qubes developers?
The fact is, though, that the vulnerability is actually quite hard to spot. It's not surprising at all that experienced security researchers would fail to spot it even when given a pretty big clue; much less that the initial developers would fail to spot it.
Passion is good (Score:1)
Now, do you actually expect the leader of a relatively small distro to personally audit everything upstream before every single release? Or were you just being rhetorical and you think that harsh criticism is always unwarranted? I do not have the time or expertise to vet anything personally, but Joanna's white papers and her philosophy for Qubes have almost always
the answer is no (Score:2)
Has Xen been written by competent developers?
Strictly speaking the answer is no, but they are definitely as good as the VMWare guys, who've had plenty of vulns.
Re:Really? (Score:5, Informative)
Show me this type of vulnerability in VMware, any version
Here's one example [pcworld.com].
Here's a story showing that VMWare tries to hide their vulnerabilities. [wired.com]
Re: (Score:2)
That wired story reads like fiction, and doesn't really explain anything.
The first link is interesting - it's not a "bug" in VMware code (which thus far has only had a couple of exploitable bugs in its history), but an extremely clever remote exploit that's only loosely related to virtualization. Certainly a design flaw in VMware Workstation, though, since they allowed it to happen.
By printing to the host's printer from the guest, which by default is Microsoft's bizarre fake printer, you can exploit Micros
Re: (Score:2)
That wired story reads like fiction, and doesn't really explain anything.
I posted it because it shows how the company, VMWare, responds to vulnerabilities. Wired has a crappy tone and I hate it (which is what you were complaining about when you said it "reads like fiction"), but on the other hand, they do a relatively good job with fact checking. Which isn't the same as doing a good job fact-checking, I guess.
The first link is interesting - it's not a "bug" in VMware code
Was the fix in VMWare code or in Microsoft code?
Re: (Score:2)
The fix is usually in the code of the company that gives a shit about its customers, regardless of where the actual problem is. This is fundamentally a horrible MS security bug, that VMware didn't wall off. I'd bet that VMware fixed it, because they actually care about security.
Re: (Score:2)
This is fundamentally a horrible MS security bug,
That's true too.
Re: (Score:2)
Show me this type of vulnerability in VMware, any version. I think you are a bit off base here. The Xen Guys are good, it sucks when this type of vulnerability were to surface, but there has never been one like this on vSphere.
Any computer software more complex than this has bugs:
10 PRINT "HELLO, WROLD!"
20 GOTO 10
.
.
.
(so does this one)
Re: (Score:2)
Show me this type of vulnerability in VMware, any version. I think you are a bit off base here. The Xen Guys are good, it sucks when this type of vulnerability were to surface, but there has never been one like this on vSphere.
Any computer software more complex than this has bugs:
10 PRINT "HELLO, WROLD!"
20 GOTO 10
.
.
.
(so does this one)
That's demonstrable false. Software can be formally proven. Not all software for the general case. But if you limit inputs or execution time, you absolutely can prove software to be correct, bug-free, etc..
Re: (Score:3)
Take your pick: https://www.cvedetails.com/vul... [cvedetails.com]
Computer security is really, really hard (Score:2)
And I can't help but wonder if much of it is because security was an afterthought for so long and if we would have been better off and designed for it from the get-go, even though it would have meant rewriting or scrapping decades of code.
The counterargument i was hearing back in the late 80s was that too much would have to be redone - and that was before the explosive growth that's seen a billion people walking around with more computing power in their pockets than most companies had available back then.
Re: (Score:1)
It's time to face the truth. Real computer security is impossible.
Re: (Score:3)
Real computer security is impossible.
We can do much, much, much better than we are doing now.
There is no reason that our lower-level systems (at least) can't be secure. You write them once (in the djb style), then don't change them, because they don't need to change.
The problem now is that there is very little motivation for programmers to even care about security. You can't see it, and no manager ever asks at a sprint, "is the code you wrote secure?"
Re: (Score:1)
Sorry, it's "cat and mouse" all the way down. The treadmill is infinite. Two things are required to break the circle, Respect, and trust. Without both, all bets are off. Just call it a day and put down a cold one (or six) and chase the old lady around the house. Dwelling on it will only give you a heart attack.
Re: (Score:2)
Sorry, it's "cat and mouse" all the way down. The treadmill is infinite.
No it's not, you can prove that your code is correct.
Re: (Score:1)
Even I can assure you there is always a way in. Nothing is invincible. If it were it would be all over the papers, and we would have world peace.
Re: (Score:2)
Even I can assure you there is always a way in.
Unplug the computer.
Re: (Score:1)
We're working on it. Don't be surprised when it lights up.
Re:Computer security is really, really hard (Score:4, Insightful)
Re: (Score:2)
I guess you have never heard of hardware verification. Puts you on same level like all the other morons claiming "everything is vulnerable".
Re: Computer security is really, really hard (Score:2)
There is no physical way to determine whether a system is leaking information in some way, or if you flip bits in a certain pattern, you can cause the memory to become corrupted, etc.
Re: (Score:2)
That is untrue. Hardware verification most certainly deals with the risks you describe. Otherwise modern chips would not work.
As to the laws of physics, you certainly can claim that fundamentally we do not understand anything (and it would even be true), but it is a worthless observation as it does not regard the context the original statement is in. You cannot go down the "nothing is certain" road and still do meaningful engineering. You can run in endless circles going that way though.
Re: (Score:2)
Dealing with risks does not mean eliminating them. I thought the original statement was in the context of having an actual real life computer running a provably correct algorithm.
So either you are thinking the context was a theoretical computing device, or that your definition of "prove" includes assuming that hardware designed to "deal with the risks [I] describe" can protect against all known and unknown attacks, now and in the future. Tempest [wikipedia.org] is still being updated, right?
I don't know what you think I'm
Re: (Score:2)
I think some people have tried to prove that it's not possible to prove the correctness of a non-trivial OS.
It's been done. You can get a fully verified OS [sel4.systems]. Incidentally, they didn't trust the compiler, so they also formally verified the assembly output.
Re: (Score:2)
Bullshit. Spoken like a true incompetent. Code vulnerabilities are caused by coders. They can be reduced and potentially eliminated by a) using better coders and b) spending more effort. In todays world where coders are often as cheap and incompetent so they just get the job still done (and management bonuses are not threatened), most code is vulnerable, but that is not fate.
Re: (Score:1)
Please... Put your best system out in the wild with a big fat bounty and see how long it holds up.
Re: (Score:2)
It would last forever. As nobody is paying _me_ a large sum of money for doing so, I have zero interest in doing this though.
The argument you present is one of the more transparent fallacies used by the typical techno-skeptic moron.
Re: (Score:1)
As nobody is paying _me_ a large sum of money for doing so, I have zero interest in doing this though.
Whoa! Like, did you even read? You put a fat reward on it, and somebody will have greater than zero interest, and will eventually succeed, within a reasonable amount of time. I thought that was spelled out in the post. Oh well, That's what I get for thinkin'..
Thank you for your participation... It was most enlightening.
I must be talking to the owner of the Titanic, or was it the Towering Inferno?
Re: Computer security is really, really hard (Score:1)
Sure, you keep harping on this, but you can only prove your code is correct. Not the operating system, not the additional libraries you use, not the output of the optimising compiler with your code as input.
Software complexity rises with a O(^N) speed with N different connections between modules or conditionals. Proving every code path correct is a gargantuan task.
That doesn't mean you shouldn't write your code to be secure and mathematically provable when possible. It means you shouldn't fall into the fals
Re: (Score:2)
Re: Computer security is really, really hard (Score:4, Insightful)
While you're at it, build your own fucking universe where everything is secure from the subatomic particle on up. If you don't your task is impossible. The end.
Re: (Score:2)
Re: (Score:3)
You can prove code is logically correct, but you can't prove the logic is correct. If you don't understand the difference, don't be a security researcher.
Re: (Score:2)
Security is always an afterthought. People want to get their products used and published, and want to make money. They need to release their stuff before the competitors do it. Only very rarely security is implemented from day one.
Re: (Score:2)
C++ fixes these issues already, if you actually learn and use the language standard libraries (yes, what you're calling the 'crap' is the fix you're too arrogant to see).
"... of unpatched installations" (Score:2)
Re: (Score:2)
If it's not a zero-day it's not a problem.
You don't know about zero-days. They haven't hit the news yet: but they're being used by hackers.
Re: (Score:2)
So that everyone finds out about it and maybe patches it?
Re: (Score:2)
Re: (Score:1)
Geez, you people almost got me scared about my qubes...
Re: (Score:2)
Big egos and small skills usually go hand-in-hand....
Re: (Score:2)
Well, at least he didn't say "pwn the b0xen".
WTF is Qubes? (Score:3)
https://www.qubes-os.org/ [qubes-os.org] claims (tongue in cheek) to be "Reasonably secure." Really it loos like they are all about the security, so this is kind of a big deal for them.
https://www.qubes-os.org/tour/... [qubes-os.org]
What is Qubes OS?
Qubes is a security-oriented operating system (OS). The OS is the software which runs all the other programs on a computer. Some examples of popular OSes are Microsoft Windows, Mac OS X, Android, and iOS. Qubes is free and open-source software (FOSS). This means that everyone is free to use, copy, and change the software in any way. It also means that the source code is openly available so others can contribute to and audit it.
Re:WTF is Qubes? (Score:4, Informative)
You can think of Qubes as a desktop OS that demotes monolithic kernels (hopelessly insecure) to the role of providing features/drivers within unprivileged VMs. This is similar to the microkernel philosophy, but also recognizes that monolithic kernels are still where all the drivers and apps are to be found.
Qubes also employs IOMMU hardware to contain network and USB controllers within unprivileged VMs to protect against DMA attacks. The admin VM that runs the desktop environment has no direct access to networking, and the user can assign other PCI devices to VMs as they see fit.
The last piece of the Qubes picture is that it departs from how most hypervisors handle graphics, keyboards and inter-VM copying. Each is properly virtualized using a very simple protocol that is highly resistant to attack, so that VMs cannot sniff your clipboard contents or keystrokes, or take screenshots, etc. Copying between Qubes VMs is also probably much safer than copying between air-gapped machines using discs or flash drives because the former is far simpler.
The Qubes Security Bulletin for this Xen vulnerability can be viewed here. [github.com]
Most Xen vulns either do not apply to Qubes or are DOS, and the Qubes project is skeptical that this one can be realistically used against Qubes. Still, the bulletin also describes how this vuln belongs to a class of memory management bugs that the Xen project has not done a good job in rectifying. This appears to be Xen's "weak spot" that could be a perennial source of vulns. As a result, Qubes will be moving away from PVMs (which use the questionable memory mapping code) to HVMs which employ on-silicon SLAT for VMs.
Re: (Score:3)
"All about security", so they insert "user ALL=(ALL) NOPASSWD: ALL" in sudoers, right? And a PolicyKit rule for anybody to do anything? And DOM0 is set up with no-password root access? I gotta tell ya, those are real head-scratchers. They have some great ideas, but I'm not sure they are living in the same world I am [qubes-os.org].
Re: (Score:2)
Qubes OS is not multi-user.
who asks the age-old question... (Score:2)
... How much did the qubes researcher, or anyone, pay for this software?
I think it's the same as with the OpenSSL library: sure, it may be buggy and unsafe. But would you rather do without? And those complaining don't *have* to use Xen, or OpenSSL: they can always use commercial software. And I have to say that the trackrecord of the Xen solution vs. the commercial solutions is pretty good.
Dissing developers who put in time and effort to help others is insulting to the entire OS community. Point out mistake
First link describes XSA-148, not XSA-182 (Score:3)
The first link is a description of XSA-148 [xen.org], which was published last October, not XSA-182.
Physical vs Virtual (Score:1)