SHARE
Facebook X Pinterest WhatsApp

Secure Virtualization Using SELinux (sVirt)

Written By
DW
Dan Walsh
Aug 25, 2009

“Before virtualization, we had isolated servers. A cracker
taking over one server meant that he controlled just that server.
The cracker would then have to launch network attacks against other
servers in the environment. System administrators had lots of tools
to defend against network attacks on machines: firewalls, network
traffic analysis tools, intrusion detection tools, etc.

“After virtualization, we have multiple services running on the
same host. If a virtual machine is broken into, the cracker just
needs to break though the hypervisor. If a hypervisor vulnerability
exists, the cracker can take over all of the virtual machines on
the host. He can even write into any virtual host images that are
accessible from the host machine.

“This is very scary stuff. The question is not “if”, but “when”.
Hacker/cracker conventions are already examining hypervisor
vulnerabilities. Crackers have already broken though the xen
hypervisor, as I documented in one of my previous blogs.

Complete
Story

DW

Dan Walsh

Recommended for you...

TUXEDO Stellaris 16 Gen6 Linux Laptop Unveiled as High-End Desktop Replacement
Marius Nestor
Oct 11, 2024
Valkey 8.0 Launches with Promising Enhancements in Speed and Efficiency
Bobby Borisov
Sep 24, 2024
12 Best Free and Open-Source Linux Renderers
webmaster
Aug 27, 2024
Kill a Process Running on a Specific Port in Linux (via 4 Methods)
Benny Lanco
Aug 2, 2024
Linux Today Logo

LinuxToday is a trusted, contributor-driven news resource supporting all types of Linux users. Our thriving international community engages with us through social media and frequent content contributions aimed at solving problems ranging from personal computing to enterprise-level IT operations. LinuxToday serves as a home for a community that struggles to find comparable information elsewhere on the web.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.