|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: [Xen-devel] Xen security advisory CVE-2011-1898 - VT-d (PCI passthrough) MSI
Cihula, Joseph writes ("RE: [Xen-devel] Xen security advisory CVE-2011-1898 -
VT-d (PCI passthrough) MSI"):
> Why do you *need* IR to have a secure Xen w/ TXT? Certainly a DoS
> is very undesirable, but that is not really a security issue.
I'm afraid that a DoS is very much a security issue.
> Tell me what security exploits are still possible with the current
> patches.
As I understand it, a DoS (host crash) is still possible.
> If someone can present a security issue that TXT
I don't understand the contribution of TXT to this. The issue is with
running untrusted guest kernels. Necessarily an untrusted guest
kernel isn't checked by TXT; that's what "untrusted guest kernel"
means.
Ian.
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |