WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] stubdom questions

Jan Beulich writes ("Re: [Xen-devel] stubdom questions"):
> On 09.11.10 at 18:00, Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx> wrote:
> > Yes, this is intentional.  We don't want to update these unless
> > necessary, really.
> 
> So even security problems fixed in upstream packages are deemed
> to be of no concern (or if they are, need to be handled manually by
> adding patches)?

The libraries underlying stubdom aren't exposed directly to hostile
data; they communicate only with the qemu in stubdom, and dom0.
Communication with the untrusted guest is done by the qemu code.
Furthermore, the stubdom itself is supposed to be no more trusted than
the guest it is servicing.  So I think in theory almost all security
bugs in these libraries should be unexploitable in the stubdom
context.

If you could point to a counterexample that would be very interesting.

> > The stubdom build system is a bit of a mess, unfortunately.
> 
> Are there intentions to get this cleaned up?

In the long term yes, but I don't think we have it as a priority.

Ian.

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

<Prev in Thread] Current Thread [Next in Thread>