xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
* Security Implications of letting customers use their own kernel
@ 2010-12-15 12:26 Jonathan Tripathy
  2010-12-16  3:51 ` Security Implications of letting customers use theirown kernel James Harper
  0 siblings, 1 reply; 5+ messages in thread
From: Jonathan Tripathy @ 2010-12-15 12:26 UTC (permalink / raw)
  To: Xen-devel

Hi Everyone,

What are the security implications of letting customers install their 
own kernel?

In my own research, I have only seen things that would compromise their 
own DomU. My main area on concern is to protect all the other DomUs.

An area of potential concern is if someone were to build a kernel that 
enabled "No Execute" or "Disable Execution", could that compromise other 
DomUs? Or would that just leave their DomU vulnerable to running 
malicious code?

Anyone aware of anything else?

Thanks

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2010-12-16 13:05 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-12-15 12:26 Security Implications of letting customers use their own kernel Jonathan Tripathy
2010-12-16  3:51 ` Security Implications of letting customers use theirown kernel James Harper
2010-12-16 12:03   ` George Dunlap
2010-12-16 12:06     ` Jonathan Tripathy
2010-12-16 13:05     ` Paolo Bonzini

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).