←back to thread

154 points walterbell | 1 comments | | HN request time: 0s | source
Show context
feld ◴[] No.10737933[source]
How is Qubes immune to Xen security issues? Slimmed down, only using PVHVM? I'm sure there have still been some CVEs that apply...
replies(1): >>10738526 #
j_s ◴[] No.10738526[source]
The reality appears to be as you have stated (some CVEs that apply).

https://news.ycombinator.com/item?id=10471912

https://raw.githubusercontent.com/QubesOS/qubes-secpack/mast...

Because there have been, of course, many more security bugs found in Xen over the last years (as the numbering of this XSA suggests). True, majority of these didn't affect Qubes OS, sometimes by pure luck, sometimes because of the extra prudence we applied, many other times because of the architectural decisions we made.

replies(1): >>10739020 #
1. nickpsecurity ◴[] No.10739020[source]
I warned them Xen was a bad foundation versus extended more secure microkernel designs. Some already had Linux in user-mode. Joanna ranted a ton then to defend her decision. Funny to see her ranting at Xen now on their mailing list and writing crap like that about what bullets they dodged.

Fortunately, GenodeOS is improving nicely and follows right principles much like what I suggested for Qubes.