dom0-provided kernels should end use of PoD memory before loading untrusted code #7504
Labels
C: Xen
P: default
Priority: default. Default priority for new issues, to be replaced given sufficient information.
R: not applicable
E.g., help/support requests, questions, discussions, "not a bug," not enough info, not actionable.
security
This issue pertains to the security of Qubes OS.
How to file a helpful issue
The problem you're addressing (if any)
There have been several XSAs related to populate on demand code.
The solution you'd like
dom0-provided kernels should ensure they have eliminated all use of PoD memory before running untrusted code.
The value to a user, and who that user might be
All users will benefit from improved security.
The text was updated successfully, but these errors were encountered: