WeSearch

Mad Bugs: QEMU and UTM Escape

Calif· ·9 min read · 0 reactions · 0 comments · 1 view
Mad Bugs: QEMU and UTM Escape

In which the guest VNCs into its own host and watches the heap like a screensaver.

Original article
Calif · Calif
Read full at Calif →
Opening excerpt (first ~120 words) tap to expand

MAD Bugs: QEMU and UTM EscapeIn which the guest VNCs into its own host and watches the heap like a screensaver.Apr 28, 20262ShareThis post is part of MAD Bugs, our Month of AI-Discovered Bugs, where we pair frontier models with human expertise and publish whatever falls out.Before we dive in, one piece of news. Dion Blazakis and Stefan Esser are joining Calif. Dion just escaped left the fruit company, so we thought it'd be fitting to drop a macOS VM escape exploit.Our targets are QEMU and UTM. QEMU is the open-source machine emulator and virtualizer that powers most Linux virtualization stacks: libvirt, OpenStack, KubeVirt, and the KVM side of many cloud platforms. UTM is the App-Store-friendly macOS and iOS frontend that wraps QEMU.

Excerpt limited to ~120 words for fair-use compliance. The full article is at Calif.

Anonymous · no account needed
Share 𝕏 Facebook Reddit LinkedIn Threads WhatsApp Bluesky Mastodon Email

Discussion

0 comments

More from Calif