Normal view

Received — 24 October 2025 Linux News & Update

VMScape: Cracking VM-Host Isolation in the Speculative Execution Age & How Linux Patches Respond

VMScape: Cracking VM-Host Isolation in the Speculative Execution Age & How Linux Patches Respond

Introduction

In the world of modern CPUs, speculative execution, where a processor guesses ahead on branches and executes instructions before the actual code path is confirmed, has long been recognized as a performance booster. However, it has also given rise to a class of vulnerabilities collectively known as “Spectre” attacks, where microarchitectural side states (such as the branch target buffer, caches, or predictor state) are mis-exploited to leak sensitive data.

Now, a new attack variant, dubbed VMScape, exposes a previously under-appreciated weakness: the isolation between a guest virtual machine and its host (or hypervisor) in the branch predictor domain. In simpler terms: a malicious VM can influence the CPU’s branch predictor in such a way that when control returns to the host, secrets in the host or hypervisor can be exposed. This has major implications for cloud security, virtualization environments, and kernel/hypervisor protections.

In this article we’ll walk through how VMScape works, the CPUs and environments it affects, how the Linux kernel and hypervisors are mitigating it, and what users, cloud operators and admins should know (and do).

What VMScape Is & Why It Matters

The Basics of Speculative Side-Channels

Speculative execution vulnerabilities like Spectre exploit the gap between architectural state (what the software sees as completed instructions) and microarchitectural state (what the CPU has done internally, such as cache loads, branch predictor updates, etc). Even when speculative paths are rolled back architecturally, side-effects in the microarchitecture can remain and be probed by attackers.

One of the original variants, Spectre-BTI (Branch Target Injection, also called Spectre v2) leveraged the Branch Target Buffer (BTB) / predictor to redirect speculative execution along attacker-controlled paths. Over time, hardware and software mitigations (IBRS, eIBRS, IBPB, STIBP) have been introduced. But VMScape shows that when virtualization enters the picture, the isolation assumptions break down.

VMScape: Guest to Host via Branch Predictor

VMScape (tracked as CVE‑2025‑40300) is described by researchers from ETH Zürich as “the first Spectre-based end-to-end exploit in which a malicious guest VM can leak arbitrary sensitive information from the host domain/hypervisor, without requiring host code modifications and in default configuration.”

Here are the key elements making VMScape significant:

  • The attack is cross-virtualization: a guest VM influences the host’s branch predictor state (not just within the guest).

Self-Tuning Linux Kernels: How LLM-Driven Agents Are Reinventing Scheduler Policies

Self-Tuning Linux Kernels: How LLM-Driven Agents Are Reinventing Scheduler Policies

Introduction

Modern computing systems rely heavily on operating-system schedulers to allocate CPU time fairly and efficiently. Yet many of these schedulers operate blindly with respect to the meaning of workloads: they cannot distinguish, for example, whether a task is latency-sensitive or batch-oriented. This mismatch, between application semantics and scheduler heuristics, is often referred to as the semantic gap.

A recent research framework called SchedCP aims to close that gap. By using autonomous LLM‐based agents, the system analyzes workload characteristics, selects or synthesizes custom scheduling policies, and safely deploys them into the kernel, without human intervention. This represents a meaningful step toward self-optimizing, application-aware kernels.

In this article we will explore what SchedCP is, how it works under the hood, the evidence of its effectiveness, real-world implications, and what caveats remain.

Why the Problem Matters

At the heart of the issue is that general-purpose schedulers (for example the Linux kernel’s default policy) assume broad fairness, rather than tailoring scheduling to what your application cares about. For instance:

  • A video-streaming service may care most about minimal tail latency.

  • A CI/CD build system may care most about throughput and job completion time.

  • A cloud analytics job may prefer maximum utilisation of cores with less concern for interactive responsiveness.

Traditional schedulers treat all tasks mostly the same, tuning knobs generically. As a result, systems often sacrifice optimisation opportunities. Some prior efforts have used reinforcement-learning techniques to tune scheduler parameters, but these approaches have limitations: slow convergence, limited generalisation, and weak reasoning about why a workload behaves as it does.

SchedCP starts from the observation that large language models can reason semantically about workloads (expressed in plain language or structured summaries), propose new scheduling strategies, and generate code via eBPF that is loaded into the kernel via the sched_ext interface. Thus, a custom scheduler (or modified policy) can be developed specifically for a given workload scenario, and in a self-service, automated way.

Architecture & Key Components

SchedCP comprises two primary subsystems: a control-plane framework and an agent loop that interacts with it. The framework decouples “what to optimise” (reasoning) from “how to act” (execution) in order to preserve kernel stability while enabling powerful optimisations.

Here are the major components:

SuperTuxKart 1.5 Released! New Skins, Egg Hunts, & Supersampling

By:Ji m
23 October 2025 at 21:44

After almost three years of development, SuperTuxKart kart racing game finally released new major 1.5 version few days ago.

The new release of this game introduced Supersampling Anti-Aliasing (SSAA) support. Meaning that it can render game resolution higher than current screen size (even over maximum display resolution). It greatly improved the graphics quality, which is however extremely heavy that may lower frame rate.

You may enable this feature by going to “Graphics” setting page and set render resolution higher than 100%.

As you can see in the screenshot above, the setting page also added new “Performance test of the current settings” benchmark button. By clicking on the option, it starts a self-driving game with single loop track, and prints the performance test results, such as FPS, duration, and your current settings when it ends.

Besides that, the Vulkan support now goes stable. It added spotlight support and significant updates to the Vulkan renderer. And, user can now go to “Custom settings…” under Graphics to easily switch the render driver to Vulkan.

SuperTuxKart 1.5 as well improved level of details (LoD) and shadow mapping logic, which significantly reduce the occurrence of the sudden or abrupt appearance of game elements. And, it improved sound scale allowing headphone users to easily pick the ideal sound level.

For the UI, the release added 6 new skins. The previous skins are now grouped as Classic with 5 variants, while a new Desert variant is added in this release. Cartoon theme now has five new variants, and each of them come with a background picture showing a scene from one of STK’s tracks.

Other changes in the release include three new egg hunts in Black Forest, Gran Paradisio Island and The Old Mine, and three new official fields in soccer mode. They are Oasis and XR-4R3N4 by CrystalDaEevee, and Hole Drop by CrystalDaEevee & Sven Andreas Belting.

There are as well following changes in the release:

  • Move full-screen toogle, resoluation, and camera options into new Display setting page.
  • Add “Screen space reflection” setting option.
  • Redesign the game mode and track selection page, reducing the need for scrolling.
  • Add ability to mark tracks and karts as favorites.
  • Add new nicer spawn animation for Parachute and Bubblegums.
  • New spotlight lighting effect for karts in night tracks.
  • New music for Las Dunas Arena and Las Dunas Soccer.

For more about the release, see the official announcement.

How to Install SuperTuxKart 1.5 in Ubuntu

The new release packages as well as the source code are available to download via the link below:

For Linux, it’s a portable tarball. Download and decompress it, then run the “run_game.sh” script to start the game.

If you want to launch the game from app launcher (e.g., Gnome App Grid, overview search), then open Text Editor, create an empty document, then paste the following lines:

[Desktop Entry]
Name=SuperTuxKart 1.5
Icon=supertuxkart
GenericName=A 3D open-source kart racing game
Exec=/home/ji/MyApps/SuperTuxKart-1.5-linux-x86_64/run_game.sh
Terminal=false
StartupNotify=false
Type=Application
Categories=Game;ArcadeGame;
Keywords=tux;game;race;
PrefersNonDefaultGPU=true

Here you need to replace the game PATH that’s in bold, according to where you saved the folder to.

In my case, I created “MyApps” folder in user home, and put all portable apps/games folders into there.

After that, save the file as “supertuxkart.desktop” into .local/share/applications directory. NOTE: .local is hidden by default, press Ctrl+H in file chooser dialog to view/hide it.

If everything goes well, you’ll be able to launch the game from start menu (or Gnome overview) few moments later.

Note for missing app icon, just grab one from the web, name it as supertuxkart (.PNG or .SVG), finally put it into .local/share/icons directory.

In my case, I have both SuperTuxKart 1.4 installed from system repository, and v1.5 via the Linux tarball. So, I have 2 game icons in launcher, but with different names.

Uninstall:

To uninstall the kart racing game installed via the steps above, simply delete the game folder using file manager.

Then, also delete the supertuxkart.desktop file from .local/share/applications, and delete the icons (if any) from .local/share/icons directory.

Distribution Release: HydraPWK GNU/Linux 2025.03

23 October 2025 at 18:03
The DistroWatch news feed is brought to you by TUXEDO COMPUTERS. HydraPWK 2025.03 has been released. HydraPWK GNU/Linux, based on Debian's "Testing" branch, is a live distribution designed primarily for penetration testing and security auditing. It contains a collection of penetration testing tools, including tools for information gathering, scanning, stress testing, exploitation, cracking, reversing engineering and forensics. "Today HydraPWK....

DeepSeek and Qwen AI Models Now Available as Ubuntu Snaps

24 October 2025 at 01:27

ubuntu logo and the snapcraft logo tiledCanonical announce beta DeepSeek and Qwen AI inference snaps for Ubuntu, both optimised to deliver better performance on Intel and ARM Ampere systems.

You're reading DeepSeek and Qwen AI Models Now Available as Ubuntu Snaps, a blog post from OMG! Ubuntu. Do not reproduce elsewhere without permission.

VirtualBox 7.2.4 Released (But Won’t Install on Ubuntu 25.10)

23 October 2025 at 03:57

VirtualBox 7.2.4 is the second maintenance update in the new 7.2.x series, but users say installation fails on Ubuntu 25.10 due to a libxml2 dependency issue.

You're reading VirtualBox 7.2.4 Released (But Won’t Install on Ubuntu 25.10), a blog post from OMG! Ubuntu. Do not reproduce elsewhere without permission.

❌