On Mon, 29 Oct 2018, Sphere wrote:

> https://threatpost.com/x-org-flaw-allows-privilege-escalation-in-linux-systems/138624/
>  
> 
> It is said that leveraging the vulnerability is possible from a remote 
> SSH session. Say an attacker was able to successfully gain a remote SSH 
> session in an untrusted VM, do you think it would be possible to gain 
> full control through qubes' implementation of X.org? 

This is a built-in assumption in Qubes OS design. That is, that VMs 
may/will get compromized due to bugs like this...

> I checked around and if I understand it right, qubes utilizes X.org in 
> order to integrate the display of PVH VM applications to what the user 
> can/must see.
>
> Because of this, what's in my mind right now is that it's possible to 
> leverage this vulnerability to gain full control but since I don't have 
> an idea of the codes or how exactly qubes' implementation of X.org 
> works, I would like to kindly ask for your thoughts about this matter.

...but it does not lead to dom0 or cross-VM compromize because of how the 
GUI isolation works (the GUI isolation does not run over X.org but is
implemented using a very simple protocol based on memcpy from X.org 
buffers).

> Earlier I was about to remove setuid of Xorg but I thought it has a good 
> chance of breaking my desktop environment altogether and that would be 
> alot of trouble for me.

If you're worried about the VMs themselves having being compromised, you 
can backup everything and use the "paranoid restore" mode after a clean 
reinstall of Qubes.


-- 
 i.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/alpine.DEB.2.20.1810300735590.21103%40whs-18.cs.helsinki.fi.
For more options, visit https://groups.google.com/d/optout.

Reply via email to