Apr 13, 2024, 06:46 by a...@qubes-os.org:

> On 4/12/24 4:50 AM, Gerhard Weck wrote:
>
>> [...]
>>
>> - Things may look different, if an attacker could, via the Xen PV drivers, 
>> break out of a Windows VM with QWT and compromise Xen, and therefore Qubes 
>> itself. In this case, usage of a Windows VM with the insecure QWT may be 
>> too risky in many, but not all circumstances. So far, I found no 
>> information, if such a scenario is possible at all. What is the extent of 
>> possible compromises of the Xen PV drivers - is it just local to the VM or 
>> could it reach into Qubes itself? It would be helpful if this could be 
>> clarified somehow.
>>
>> [...]
>>
>
> This was already clearly addressed in QSB-091:
>
>> Impact
>> -------
>>
>> If the Xen Project's Windows PV Drivers were compromised at build time,
>> all Windows qubes that have Qubes Windows Tools (QWT) installed may also
>> be compromised. If the drivers were not compromised at build time, then
>> there is no known vulnerability.
>>
>> Dom0 is not affected, even though the `qubes-windows-tools` package is
>> installed in dom0, since neither the dom0 package build process nor dom0
>> itself interprets these driver files. Rather, the purpose of this
>> package is merely to make the driver files available to the Windows
>> qubes in which QWT are installed.
>>
>
> In other words, only the Windows VMs using QWT are potentially at risk, not 
> dom0, Xen, or Qubes OS itself.
>


@adw , thank you. So, QWT does not directly affect security of dom0 nor other 
non-windows qubes.

Please also tell if QWT is deprecated, as unman kind of said, or not?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/NvN0s7D--3-9%40tutanota.com.

Reply via email to